Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Assisted Instruction | 5 |
Computer Security | 5 |
Information Technology | 5 |
Educational Technology | 4 |
Internet | 4 |
Telecommunications | 3 |
College Instruction | 2 |
Computer Literacy | 2 |
Computer Networks | 2 |
Computer Science Education | 2 |
Computer Software | 2 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
British Journal of… | 1 |
International Association for… | 1 |
Library Software Review | 1 |
Author
Archer, Ricky | 1 |
Heffernan, Neil | 1 |
Kilpatrick, Thomas L., Ed. | 1 |
McDowell, Steve | 1 |
Qadah, Yaseen | 1 |
Race, Phil | 1 |
Vega, Percy | 1 |
Wang, Shudong | 1 |
Xu, Jinsheng | 1 |
Yu, Huiming | 1 |
Yuan, Xiaohong | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Book/Product Reviews | 1 |
Books | 1 |
Collected Works - Proceedings | 1 |
Guides - Non-Classroom | 1 |
Reference Materials -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Teachers | 2 |
Practitioners | 1 |
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wang, Shudong; Heffernan, Neil – British Journal of Educational Technology, 2010
Pedagogical theories and the applications of information technology for language learning have been widely researched in various dimensions. However, ethical issues, such as online privacy and security, and learners' personal data disclosure, are not receiving enough research attention. The perceptions and attitudes from those who participate in…
Descriptors: Information Technology, Educational Technology, Ethics, Second Language Learning
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Race, Phil; McDowell, Steve – 1996
This how-to manual is intended to ease the transition to the information technology age even for those teachers who have no previous knowledge or experience with computers. Written in a concise, numbered paragraph format, the text uses simple nontechnical language. The first chapter titled, "Getting Started with Computers," covers choosing and…
Descriptors: Computer Anxiety, Computer Assisted Instruction, Computer Literacy, Computer Peripherals

Kilpatrick, Thomas L., Ed. – Library Software Review, 1998
Provides annotations of 29 journal articles and six book reviews on a variety of topics related to technology in libraries, including collection development, computer-assisted instruction, databases, distance education, ergonomics, hardware, information technology, interlibrary loan and document supply, Internet, online catalogs, preservation,…
Descriptors: Annotated Bibliographies, Book Reviews, Computer Assisted Instruction, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers