Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Clark, J. R.; Niederjohn, M. Scott; Wood, William C. – Social Education, 2018
The cryptocurrency Bitcoin has been prominently featured in the news recently. Its ascension in value has been nothing short of extraordinary. This article briefly explains what Bitcoin is and how it works. The more challenging question is what Bitcoin--this cryptographic breakthrough--really is: currency, like the U.S. dollar, an asset, more like…
Descriptors: Monetary Systems, Definitions, Computer Networks, Consumer Economics
Hui Meng; Li Ma; Lei Su; Bei Lu; Di Hou; Xiaowei Du – International Journal of Web-Based Learning and Teaching Technologies, 2024
Intangible cultural heritage is an important part of Chinese excellent traditional culture, and college dance teaching is paid more attention by researchers of physical education and computer technology. In order to help the inheritance and development of non-legacy culture in college dance teaching, this paper analyzes the influencing factors of…
Descriptors: Dance Education, Cultural Background, Telecommunications, Computer Networks
Ruediger, Dylan – ITHAKA S+R, 2021
Ithaka S+R's Research Support Services program's most recent project, "Supporting Big Data Research," focused specifically on the rapidly emerging use of big data in research across disciplines and fields. As part of this study, they partnered with librarians from more than 20 colleges and universities, who then conducted over 200…
Descriptors: Colleges, Universities, Data Analysis, Data Collection
Gallagher, Michael – Discourse: Studies in the Cultural Politics of Education, 2020
This paper concerns children's relations with the geological aspects of digital media technologies. Using ideas from media theory, I develop a new conceptual framework for childhood studies research on digital media that goes beyond the dominant focus on children's use of technology. I argue that studies of use would benefit from being linked up…
Descriptors: Geology, Information Technology, Climate, Local Issues
Anagrolia Faustino; Guneet Kaur Cheema; Marcus Bussey – Journal of Interdisciplinary Studies in Education, 2024
This paper investigates the use of commonly employed technologies in education across East African countries, specifically focusing on Tanzania, Kenya, Uganda, Rwanda, and Sudan. It draws on Google Scholar to identify key technologies used in teaching and learning, emphasizing their benefits, such as increased student engagement, commitment,…
Descriptors: Educational Technology, Technology Uses in Education, Foreign Countries, Learner Engagement
State Educational Technology Directors Association, 2019
Since 1993, at the regional level, the Minnesota Education Technology Networks (METN), a cooperative of regional networks, provides regional network development, support and leadership to Minnesota school districts. METN member cooperatives provide network coordination, procurement, and other support to help school districts acquire and manage…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
GuoRong Huang; Xing Liu; Hui Sun – International Journal of Web-Based Learning and Teaching Technologies, 2024
This research evaluates the efficacy of a basketball-based teaching and training system supported by 5G technology in a wireless network environment. Initially are information about the Chinese basketball students is first gathered and then divided into a Control Group (CG) and an Experimental Group (EG). The control group uses the standard method…
Descriptors: Curriculum Development, Team Sports, Internet, Computer Networks
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Valcourt, Scott A. – ProQuest LLC, 2017
The Science DMZ is a network research tool offering superior large science data transmission between two locations. Through a network design that places the Science DMZ at the edge of the campus network, the Science DMZ defines a network path that avoids packet inspecting devices (firewalls, packet shapers) and produces near line-rate transmission…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data Processing
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Sicart, Miguel – American Journal of Play, 2018
The author proposes a rhetoric of computational play as a perspective for the analysis of the ludic in the Information Age. Combining concepts from the philosophy of information and postphenomenology with different theories of play, he argues that there is a play element shaping the cultural impact of computational media and that this kind of play…
Descriptors: Computer Use, Play, Computation, Information Science
Abdrabou, Atef; Shakhatreh, Walid – Journal of Technology and Science Education, 2021
In the era of the Internet-of-everything, learning the principles of data communications and networking is inevitable for many electrical engineering disciplines. The paper addresses the effectiveness of teaching the fundamentals of data communications and networking using a dedicated lab course as a co-requisite to a classic lecture-based course.…
Descriptors: Computer Networks, Computer Science Education, Engineering Education, Instructional Effectiveness
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems

Peer reviewed
Direct link
