Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Kathy D. Lohr – New Directions for Adult and Continuing Education, 2025
Having access to the Internet and acquiring the skills necessary to use, question, and create in a digital environment have become essential to living and working in the 21st century. Yet, this move to digitalization has created a digital divide between those who have broadband "access" and the "skills and attitudes" to…
Descriptors: Digital Literacy, Access to Internet, Equal Education, Global Approach
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Khalid Mohiuddin; Huda Fatima; Mohiuddin Ali Khan; Mohammad Abdul Khaleel; Zeenat Begum; Sajid Ali Khan; Omer Bin Hussain – SAGE Open, 2023
This article aims to design a novel edge-centric hierarchical cloud architecture to optimize mobile learning (m-learning) performance during learners executing computation-intensive learning applications. This research adopts the potential of distributed computing paradigms, that is, mobile edge, for improving the effectiveness of m-learning…
Descriptors: Computer Networks, Electronic Learning, College Students, Handheld Devices
Exploring Homophily in Demographics and Academic Performance Using Spatial-Temporal Student Networks
Nguyen, Quan; Poquet, Oleksandra; Brooks, Christopher; Li, Warren – International Educational Data Mining Society, 2020
Network analysis in educational research has primarily relied on self-reported relationships or connections inferred from online learning environments, such as discussion forums. However, a large part of students' social connections through day-to-day on-campus encounters has remained underexplored. The paper examines spatial-temporal student…
Descriptors: Social Networks, Network Analysis, Data Analysis, Computer Networks
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Ayadi, Mohamed Issam; Maizate, Abderrahim; Ouzzif, Mohammed; Mahmoudi, Charif – International Journal of Web-Based Learning and Teaching Technologies, 2021
In this paper, the authors propose a novel forwarding strategy based on deep learning that can adaptively route interests/data packets through ethernet links without relying on the FIB table. The experiment was conducted as a proof of concept. They developed an approach and an algorithm that leverage existing intelligent forwarding approaches in…
Descriptors: Computer Networks, Artificial Intelligence, Mathematics, Models
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Jorge J. Mendieta – ProQuest LLC, 2021
This qualitative descriptive study explored how full-time faculty of a California higher education institution described their experience with the Information Technology Services employees' commitment, communications, and quality of customer service when resolving classroom Wi-Fi issues. The study used the model of Total Quality Management (TQM)…
Descriptors: Information Technology, Higher Education, Technical Support, Teacher Attitudes
Rui Du – International Journal of Information and Communication Technology Education, 2024
In the context of the multimedia era, college counselors and college students should make progress together. This article aims to explore the practical issues of applying multimedia and visual-image technology to the training of college counselors. We propose a three-dimensional multimedia visual image recognition technology based on convolutional…
Descriptors: Multimedia Materials, Visual Aids, Video Technology, School Counselors
Nan Wu – International Journal of Web-Based Learning and Teaching Technologies, 2024
Higher education is becoming increasingly competitive and all educational institutions are concentrating on improving quality and changing traditional higher education teaching methods. New-type classroom instruction has embraced a unique advancement opportunity with the arrival of the fifth generation (5G) era. It is critical to develop a…
Descriptors: Instructional Effectiveness, Internet, Computer Literacy, Artificial Intelligence
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Amitabh Verma – Journal of Educators Online, 2025
This study provides a thorough bibliometric analysis of the research landscape concerning the application of soft computing in higher education. This study collects 5,140 pieces including books, book chapters, journal articles published in respected journals, and conference papers presented at notable international conferences that were published…
Descriptors: Bibliometrics, Computer Uses in Education, Computer Science, Higher Education
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Luse, Andy; Brown, Amanda; Rursch, Julie – IEEE Transactions on Education, 2021
Contribution: A novel approach to remote instruction in 802.11 technology is described using the virtual lab technology. Background: Lab-based education has been a staple of computing education for decades. By interacting with the technology, students are able to gain a much greater understanding of the subject through hands-on activities.…
Descriptors: Distance Education, Technology Education, Experiential Learning, Computer Networks

Peer reviewed
Direct link
