Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 31 |
Descriptor
Computer Networks | 242 |
Educational Technology | 242 |
Higher Education | 242 |
Computer Uses in Education | 103 |
Distance Education | 72 |
Information Technology | 71 |
Telecommunications | 70 |
Computer Assisted Instruction | 68 |
Elementary Secondary Education | 56 |
Internet | 54 |
Foreign Countries | 46 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 41 |
Postsecondary Education | 12 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Location
Canada | 8 |
United States | 7 |
United Kingdom | 6 |
Pennsylvania | 5 |
Australia | 4 |
Japan | 4 |
Netherlands | 4 |
California | 3 |
China | 3 |
Colorado | 3 |
Washington | 3 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 2 |
Americans with Disabilities… | 1 |
Copyright Law 1976 | 1 |
Equal Access | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Does not meet standards | 1 |
Pisano, Mark – ProQuest LLC, 2017
Universities and Higher Education Institutions spend large sums of money to maintain and build network infrastructures. Current research and discussions in this area revolve around providing large amounts of bandwidth to students who live in a residence hall. However, there is a lack of information showing what is being used to support research…
Descriptors: Higher Education, Computer Networks, Educational Technology, Technology Uses in Education
Virtanen, Mari Aulikki; Haavisto, Elina; Liikanen, Eeva; Kääriäinen, Maria – Education and Information Technologies, 2018
Ubiquitous learning and the use of ubiquitous learning environments heralds a new era in higher education. Ubiquitous learning environments enhance context-aware and seamless learning experiences available from any location at any time. They support smooth interaction between authentic and digital learning resources and provide personalized…
Descriptors: Higher Education, Literature Reviews, Educational Technology, Technology Uses in Education
Zabasta, Anatolijs; Peuteman, Joan; Kunicina, Nadezda; Kazymyr, Volodymyr; Hvesenya, Sergey; Hnatov, Andrii; Paliyeva, Tatsiana; Ribickis, Leonids – Education Sciences, 2020
The increasing importance of continuingly complex Cyber-Physical Systems (CPS) challenges and encourages universities worldwide to organize up-to-date CPS oriented educational programs. The Erasmus+ project "CybPhys" aims to support CPS oriented educational programs in Belarus and Ukraine. We put forward a hypothesis that the educational…
Descriptors: Foreign Countries, Geographic Regions, Cultural Differences, Higher Education
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Ogawa, Nobuyuki; Shimizu, Akira – International Association for Development of the Information Society, 2017
This paper describes our concrete efforts to improve the functions of the computer rooms in the Information Processing Center from among several organisational strategies which can assume a large role in the next-generation education, while examining the practice of active learning by the faculty in all classes using ICT equipment. We implemented…
Descriptors: Educational Technology, Technology Uses in Education, Information Processing, Equipment
Duan, Yuchao – International Association for Development of the Information Society, 2016
Cloud computing is considered a new frontier in the field of computing, as this technology comprises three major entities namely: software, hardware and network. The collective nature of all these entities is known as the Cloud. This research aims to examine the impacts of various aspects namely: cloud computing, sustainability, performance…
Descriptors: Higher Education, Internet, Educational Technology, Technology Uses in Education
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Delialioglu, Omer – Educational Technology & Society, 2012
This study investigates how blending of different instructional approaches with technology affects students' engagement. A computer networks course was designed and implemented for the first eight weeks of the semester as a lecture-based blended learning environment and for the second eight weeks of the semester as a problem-based blended learning…
Descriptors: Learner Engagement, Educational Environment, Time on Task, Computer Networks
Cismaru, Romulus; Cismaru, Magdalena – Journal of College Teaching & Learning, 2011
Laptop use in class is a characteristic of universities that is changing rapidly. Although much of the attention and research regarding this issue has focused on the debate of whether to impose mandatory laptop programs, the reality of wireless campuses allows students to use their laptops in class for class related and non-class related…
Descriptors: Student Attitudes, Universities, Laptop Computers, Foreign Countries
Diffin, Jennifer; Chirombo, Fanuel; Nangle, Dennis; de Jong, Mark – Journal of Web Librarianship, 2010
This article explains how the document management team (circulation and interlibrary loan) at the University of Maryland University College implemented Microsoft's SharePoint product to create a central hub for online collaboration, communication, and storage. Enhancing the team's efficiency, organization, and cooperation was the primary goal.…
Descriptors: Distance Education, Cooperation, Educational Technology, Library Services
Cochrane, Thomas D. – Journal of Asynchronous Learning Networks, 2011
Mobile learning (m-learning) has moved beyond the realms of fantasy to become a viable platform for contextual learning that bridges formal and informal learning environments. This paper overviews how mobile Web 2.0 has been instrumental in facilitating pedagogical change and informing an institution's new e-learning strategy that focuses upon…
Descriptors: Electronic Learning, Communities of Practice, Constructivism (Learning), Learning Strategies
Oriaku, Ngozi – College Teaching Methods & Styles Journal, 2008
Wireless technologies have revolutionized the ways teaching and learning have become in many colleges and universities. It is therefore interesting to observe the way wireless technologies are used to organize small group meetings. It provides online access to internet resources such as instructor lecture series. It finally helps in…
Descriptors: Computer Networks, Telecommunications, Educational Technology, Internet
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Dawson, Phillip – Australasian Journal of Educational Technology, 2010
This article presents an argument for the use of networked interactive whiteboards (NIWBs) in regional Australian higher education and identifies new pedagogies for this context. Most Australian universities operate multiple campuses, and many use video conference facilities to deliver courses across these sites. For students at remote video…
Descriptors: Higher Education, Computer Assisted Instruction, Lecture Method, Regional Programs