NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
National Assessment of…3
What Works Clearinghouse Rating
Showing 1 to 15 of 536 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Berson, Michael J.; Berson, Ilene R. – Social Education, 2020
The reality is that digital archives are fragile. Many people appreciate how information technology has revolutionized their lives but have spent little time reflecting on the historical significance of the migration from a print-based to a digital society. In the 100th year of the National Council for the Social Studies (NCSS), it seems timely to…
Descriptors: History, Memory, Obsolescence, Technology
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Tingting Feng – Education and Information Technologies, 2024
The globalization of educational processes has intensified the introduction of interactive learning forms. Education systems around the world have undergone transformation, modernization, and innovation. These processes also implied the implementation of advanced technological tools to improve the quality of teaching various subjects, including…
Descriptors: Computer Storage Devices, Computer Software, Computer Oriented Programs, Influence of Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Scomparin, P. R.; Carvalho-Neto, J. T. – Physics Education, 2018
Newton's laws of mechanics are a cornerstone in the development of modern science and its learning can be the very first opportunity for students to defy their common sense perceptions and replace them with a more robust world view. However, despite their fundamental importance, many studies demonstrate how difficult is the true comprehension of…
Descriptors: Physics, Science Instruction, Teaching Methods, Scientific Principles
Altiparmak, Nihat – ProQuest LLC, 2013
Massive amount of data is generated everyday through sensors, Internet transactions, social networks, video, and all other digital sources available. Many organizations store this data to enable breakthrough discoveries and innovation in science, engineering, medicine, and commerce. Such massive scale of data poses new research problems called big…
Descriptors: Information Storage, Data, Computer Storage Devices, Information Retrieval
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Waters, John K. – Education Digest: Essential Readings Condensed for Quick Review, 2011
The vulnerability and inefficiency of backing up data on-site is prompting school districts to switch to more secure, less troublesome cloud-based options. District auditors are pushing for a better way to back up their data than the on-site, tape-based system that had been used for years. About three years ago, Hendrick School District in…
Descriptors: Information Storage, School Districts, Computer Storage Devices, Internet
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Stamas, Paul J. – ProQuest LLC, 2013
This case study research followed the two-year transition of a medium-sized manufacturing firm towards a service-oriented enterprise. A service-oriented enterprise is an emerging architecture of the firm that leverages the paradigm of services computing to integrate the capabilities of the firm with the complementary competencies of business…
Descriptors: Manufacturing, Organizational Change, Internet, Information Storage
Hastings, Robin – Computers in Libraries, 2012
Backups are a modern fact of life. Every organization that has any kind of computing technology (and that is all of them these days) needs to back up its data in case of technological or user errors. Traditionally, large-scale backups have been done via an internal or external tape drive that takes magnetic tapes (minicassettes, essentially) and…
Descriptors: Internet, Computer Storage Devices, Information Storage, Computer Software Evaluation
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Nedungadi, Prema; Raman, Raghu – Educational Technology Research and Development, 2012
Most personalized learning systems are designed for either personal computers (e-learning) or mobile devices (m-learning). Our research has resulted in a cloud-based adaptive learning system that incorporates mobile devices into a classroom setting. This system is fully integrated into the formative assessment process and, most importantly,…
Descriptors: Electronic Learning, Feedback (Response), Formative Evaluation, Telecommunications
Chebrolu, Shankar Babu – ProQuest LLC, 2010
Against the backdrop of new economic realities, one of the larger forces that is affecting businesses worldwide is cloud computing, whose benefits include agility, time to market, time to capability, reduced cost, renewed focus on the core and strategic partnership with the business. Cloud computing can potentially transform a majority of the…
Descriptors: Program Effectiveness, Information Technology, Correlation, Internet
Kolowich, Steve – Chronicle of Higher Education, 2009
The job of literary archivist is changing as paper manuscripts yield to laptops, Blackberry's, and Facebook content, and digital preservation lets scholars learn more about authors' creative process than ever before. Personal computers and external storage devices have been around for more than a quarter-century, but only now, as the famous…
Descriptors: Preservation, Archives, Library Automation, Influence of Technology
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  36