Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Demski, Jennifer – Campus Technology, 2010
As higher education budgets tighten in the ongoing recession, colleges and universities have found themselves questioning, lengthening, and even eliminating tech refresh cycles. Yet how deep an institution cuts into its refresh program can compromise its ability to provide an up-to-date and competitive computing environment for students and a…
Descriptors: Educational Technology, Cost Effectiveness, Information Networks, Technology Planning
Rangan, Prahalad – ProQuest LLC, 2010
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
Descriptors: Computer Security, Topology, Computer Networks, Computers
Srinivasan, Satish Mahadevan – ProQuest LLC, 2010
Data Aggregation (DA) is a set of functions that provide components of a distributed system access to global information for purposes of network management and user services. With the diverse new capabilities that networks can provide, applicability of DA is growing. DA is useful in dealing with multi-value domain information and often requires…
Descriptors: Data, Computer Networks, Computer Security, Access to Information
Johnson, R. LeWayne – ProQuest LLC, 2012
Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…
Descriptors: Information Technology, Governance, Federal Government, Information Security
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Shambare, Narcissus – ProQuest LLC, 2013
The problem examined in the proposed study was the underutilization of the intranet portals (IP) by faculty in institutions of higher education (IHE). Despite the time and investment allocated to the IP, the technology remains underutilized to improve productivity, efficiency, and justify its investment yet there is lack of understanding of why…
Descriptors: Computer Networks, Computer Uses in Education, College Faculty, Educational Technology
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Warschauer, Mark; Arada, Kathleen; Zheng, Binbin – Journal of Adolescent & Adult Literacy, 2010
Can daily access to laptop computers help students become better writers? Are such programs affordable? Evidence from the Inspired Writing program in Littleton Public Schools, Colorado, USA, provides a resounding yes to both questions. The program employs student netbooks, open-source software, cloud computing, and social media to help students in…
Descriptors: Computer Software, Computers, Writing Instruction, Laptop Computers
Berry, Barnett; Byrd, Ann – Yearbook of the National Society for the Study of Education, 2012
In this chapter, the authors draw on their experiences with working in building virtual communities of teachers and a pilot program to examine the prospects for increasing consistency in the effectiveness of new teacher support through online networks. Although not intended as a substitute for high-quality face-to-face mentoring experiences,…
Descriptors: Pilot Projects, Mentors, Beginning Teachers, Computer Mediated Communication
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Moyle, Kathryn – Australian Council for Educational Research, 2010
Australian Education Review (AER) 56 explores national and international policy priorities for building students' innovation capabilities through information and communication technologies (ICT) in Australian schools. Section 1 sets out the Australian policy context for digital education and highlights some of the emerging challenges. It provides…
Descriptors: Innovation, Foreign Countries, Educational Policy, Information Technology
Ireh, Maduakolam – School Business Affairs, 2010
School districts need adequate financial resources to purchase hardware and software, wire their buildings to network computers and other information and communication devices, and connect to the Internet to provide students, teachers, and other school personnel with adequate access to technology. Computers and other peripherals, particularly,…
Descriptors: Purchasing, Computer Software, Educational Technology, Information Technology

Direct link
Peer reviewed
