NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 40 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Rivers, Kelly; Koedinger, Kenneth R. – International Journal of Artificial Intelligence in Education, 2017
To provide personalized help to students who are working on code-writing problems, we introduce a data-driven tutoring system, ITAP (Intelligent Teaching Assistant for Programming). ITAP uses state abstraction, path construction, and state reification to automatically generate personalized hints for students, even when given states that have not…
Descriptors: Programming, Coding, Computers, Data
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ashmarina, Svetlana I.; Khasaev, Gabibulla R.; Mantulenko, Valentina V.; Kasarin, Stanislav V.; Dorozhkin, Evgenij M. – International Journal of Environmental and Science Education, 2016
The relevance of the investigated problem is caused by the need to assess the implementation of informatization level of the region and the insufficient development of the theoretical, content-technological, scientific and methodological aspects of the assessment of the region's information potential. The aim of the research work is to develop a…
Descriptors: Information Technology, Communications, Information Networks, Information Security
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Peer reviewed Peer reviewed
Direct linkDirect link
Ward, R. Bruce; Sienkiewicz, Frank; Sadler, Philip; Antonucci, Paul; Miller, Jaimie – Astronomy Education Review, 2013
We describe activities created to help student participants in Project ITEAMS (Innovative Technology-Enabled Astronomy for Middle Schools) develop a deeper understanding of picture elements (pixels), image creation, and analysis of the recorded data. ITEAMS is an out-of-school time (OST) program funded by the National Science Foundation (NSF) with…
Descriptors: Astronomy, Middle School Students, Science Instruction, Computer Uses in Education
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Bull, Glen; Garofalo, Joe – Learning & Leading with Technology, 2010
The ability to move from one representation of data to another is one of the key characteristics of expert mathematicians and scientists. Cloud computing will offer more opportunities to create and display multiple representations of data, making this skill even more important in the future. The advent of the Internet led to widespread…
Descriptors: Internet, Computer Software, Computers, Users (Information)
O'Hanlon, Charlene; Schaffhauser, Dian – Campus Technology, 2011
It's a perfect storm out there, with powerful forces remaking the IT landscape in higher education. On one side, devastating budget cuts are pushing IT departments to identify ever-greater cost savings. On the other, the explosion in mobile devices is pressuring IT to provide anytime, anywhere computing with no downtime. And finally there's…
Descriptors: Information Technology, Higher Education, Handheld Devices, Colleges
Peer reviewed Peer reviewed
Direct linkDirect link
Nelson, Brian C.; Erlandson, Benjamin; Denham, Andre – British Journal of Educational Technology, 2011
In this paper, we take a designer's look at how the activities and data of learning and assessment can be structured in immersive virtual game environments called Massively Multi-Player Online Games (MMOG). In doing so, we examine the channels of evidence through which learning and assessment activities are derived in MMOGs, offering examples of…
Descriptors: Evidence, Data, Learning Activities, Educational Assessment
Peer reviewed Peer reviewed
Direct linkDirect link
Kinloch, Jennifer M.; Foster, T. Mary; McEwan, James S. A. – Psychological Record, 2009
Participants earned points by pressing a computer space bar (Experiment 1) or forming rectangles on the screen with the mouse (Experiment 2) under differential-reinforcement-of-low-rate schedules, followed by extinction. Variability in interresponse time (the contingent dimension) increased during extinction, as for Morgan and Lee (1996);…
Descriptors: Behavior Modification, Reinforcement, Experiments, Adults
Manjarrez, Carlos A.; Schoembs, Kyle – Institute of Museum and Library Services, 2011
Over the past decade, policy discussions about public access computing in libraries have focused on the role that these institutions play in bridging the digital divide. In these discussions, public access computing services are generally targeted at individuals who either cannot afford a computer and Internet access, or have never received formal…
Descriptors: Access to Information, Computers, Public Libraries, Internet
Ramaswami, Rama; Raths, David; Schaffhauser, Dian; Skelly, Jennifer – Campus Technology, 2011
For many IT shops, the cloud offers an opportunity not only to improve operations but also to align themselves more closely with their schools' strategic goals. The cloud is not a plug-and-play proposition, however--it is a complex, evolving landscape that demands one's full attention. Security, privacy, contracts, and contingency planning are all…
Descriptors: Educational Planning, Campuses, Information Technology, Higher Education
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Myers, Jill Joline; McCaw, Donna S.; Hemphill, Leaunda S. – Corwin, 2011
A parent brings a cyber bullying incident to your attention and expects you to resolve it. What are the students' rights and your responsibilities according to the law? Because the laws regarding disciplinary action are still evolving, this manual fills the gap by providing public school leaders with data-driven solutions for managing cyber…
Descriptors: Public Schools, Discipline, Constitutional Law, Court Litigation
Previous Page | Next Page ยป
Pages: 1  |  2  |  3