Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 13 |
Since 2016 (last 10 years) | 38 |
Since 2006 (last 20 years) | 140 |
Descriptor
Source
Author
Nickerson, Gord | 6 |
Breeding, Marshall | 4 |
Descy, Don E. | 4 |
Eastman, Skip | 3 |
Green, Kenneth C. | 3 |
Harris, Judi | 3 |
Machovec, George S. | 3 |
Basch, Reva | 2 |
Behrens, John T. | 2 |
Coffman, Steve | 2 |
Duin, Ann Hill | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 65 |
Teachers | 28 |
Administrators | 22 |
Policymakers | 15 |
Students | 6 |
Media Staff | 5 |
Researchers | 5 |
Parents | 4 |
Community | 1 |
Counselors | 1 |
Location
Australia | 7 |
Canada | 7 |
Spain | 7 |
United States | 7 |
United Kingdom | 6 |
Florida | 4 |
Pennsylvania | 4 |
United Kingdom (England) | 4 |
Arizona | 3 |
California | 3 |
China | 3 |
More ▼ |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
Fast Response Survey System | 1 |
Program for International… | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Kok, Illasha; Beter, Petra; Esterhuizen, Hennie – International Journal of Distance Education Technologies, 2018
Fragmented connectivity in South Africa is the dominant barrier for digitising initiatives. New insights surfaced when a university-based nursing programme introduced tablets within a supportive network learning environment. A qualitative, explorative design investigated adult nurses' experiences of the realities when moving from paper-based…
Descriptors: Nurses, Handheld Devices, Information Technology, Blended Learning
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Brooks, Tyson T. – ProQuest LLC, 2013
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Descriptors: Risk Management, Computer Security, Computer Software, Computer Networks
Frolova, Elena V.; Ryabova, Tatyana M.; Rogach, Olga V. – European Journal of Contemporary Education, 2019
The dynamic development of information and communication technologies, the strengthening of the public demand for digitalization of various spheres of life, orient the Moscow education system towards the active introduction of digital technologies and high-tech educational environment development. The purpose of this article is to analyze the…
Descriptors: Information Technology, Technology Integration, Program Implementation, Barriers
Hodgman, Matthew R. – Contemporary Issues in Education Research, 2013
As educational technology continues to rapidly become a vital part of a school district's infrastructure, desktop virtualization promises to provide cost-effective and education-enhancing solutions to school-based computer technology problems in school systems locally and abroad. This article outlines the history of and basic concepts behind…
Descriptors: Educational Technology, Barriers, Computer Software, Computer Networks
Osaheni Oni; Kelly Odaro-Ekhaguebo; Emmanuel Akpoduado – Journal of Pedagogical Research, 2018
This study assessed Information and Communication Technology (ICT) Proficiency of Secondary School Teachers in Auchi Polytechnic Staff School. The study employed a descriptive surveyed design and purposive sampling techniques to select fifty-three (53) respondents for the study. A structured questionnaire was used to collect data. The data…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Technology, Teacher Evaluation
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Abdel-Maksoud, Nahed F. – International Journal of Education and Practice, 2018
Virtualization technology has been around for many years, and its use is increasingly becoming common in education, in general and in computing fields, in particular. This can be attributed partly to its potential to reduce costs, boost efficiency and overcome limited resources through its virtual applications such as servers, storage devices and…
Descriptors: Electronic Learning, Educational Environment, Educational Quality, Instructional Effectiveness
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Verdú, Elena; Regueras, Luisa M.; Gal, Eran; de Castro, Juan P.; Verdú, María J.; Kohen-Vacs, Dan – Educational Technology Research and Development, 2017
INTUITEL is a research project aiming to offer a personalized learning environment. The INTUITEL approach includes an Intelligent Tutoring System that gives students recommendations and feedback about what the best learning path is for them according to their profile, learning progress, context and environmental influences. INTUITEL combines…
Descriptors: Technology Integration, Intelligent Tutoring Systems, Computer Networks, Computer System Design
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Nguyen, Lilly Uyen – ProQuest LLC, 2013
This dissertation explores the social worlds of pirated software discs and free/open source software in Vietnam to describe the practices of copying, evangelizing, and translation. This dissertation also reveals the cultural logics of similarity and continuity that sustain these social worlds. Taken together, this dissertation argues that the…
Descriptors: Foreign Countries, Computer Networks, Computer Software, Copyrights
Etherington, Thomas R. – Journal of Geography in Higher Education, 2016
Computer programming is not commonly taught to geographers as a part of geographic information system (GIS) courses, but the advent of NeoGeography, big data and open GIS means that programming skills are becoming more important. To encourage the teaching of programming to geographers, this paper outlines a course based around a series of…
Descriptors: Programming, Geographic Information Systems, Geography Instruction, Introductory Courses