Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Science | 12 |
Information Technology | 12 |
Information Management | 10 |
Computer Software | 6 |
Computer Networks | 4 |
Computers | 4 |
Internet | 4 |
Metadata | 4 |
Access to Information | 3 |
Classification | 3 |
Delivery Systems | 3 |
More ▼ |
Source
ProQuest LLC | 4 |
Proceedings of the ASIS… | 2 |
Computers & Education | 1 |
Educational Research and… | 1 |
International Association for… | 1 |
Journal of Information… | 1 |
Author
Amin, Rohan Mahesh | 1 |
Blake, Cecil | 1 |
Burnett, Kathleen | 1 |
Chen, Ling | 1 |
Cheung, Waiman | 1 |
Dragut, Eduard Constantin | 1 |
Gallagher, Marcus | 1 |
Jurisica, Igor | 1 |
Karamete, Aysen | 1 |
Kupcu, Alptekin | 1 |
Li, Eldon Y. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Practitioners | 1 |
Teachers | 1 |
Location
Australia | 2 |
Turkey | 2 |
Asia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Karamete, Aysen – Educational Research and Reviews, 2015
This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…
Descriptors: Computer Science, Educational Technology, Student Teacher Attitudes, Reliability
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Dragut, Eduard Constantin – ProQuest LLC, 2010
An increasing number of Web sites expose their content via query interfaces, many of them offering the same type of products/services (e.g., flight tickets, car rental/purchasing). They constitute the so-called "Deep Web". Accessing the content on the Deep Web has been a long-standing challenge for the database community. For a user interested in…
Descriptors: Internet, Web Sites, Search Engines, Information Retrieval
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Jurisica, Igor; Mylopoulos, John; Yu, Eric – Proceedings of the ASIS Annual Meeting, 1999
Surveys some of the basic concepts that have been used in computer science for the representation of knowledge and summarizes some of their advantages and drawbacks. Relates these techniques to information sciences theory and practice. Concepts are classified in four broad ontological categories: static ontology, dynamic ontology, intentional…
Descriptors: Classification, Computer Science, Information Industry, Information Management
Ng, Kwong Bor; Park, Soyeon; Burnett, Kathleen – Proceedings of the ASIS Annual Meeting, 1997
Examines the different concepts and orientations of the two major approaches to the role of metadata in the digital library (library science-oriented bibliographic control and computer science-oriented data management), and proposes an integrated concept of metadata to facilitate the merging of these two approaches. Discusses ongoing efforts to…
Descriptors: Bibliographic Databases, Cataloging, Computer Science, Electronic Libraries
Blake, Cecil – 1991
This paper discusses current information technologies and their applications, both real and potential, in the field of public relations. It is argued that public relations are more important than ever in view of global events that challenge the world's ability to handle problems related to public trust and confidence, and the telecommunications…
Descriptors: Computer Networks, Computer Science, Databases, Developing Nations
Cheung, Waiman; Li, Eldon Y.; Yee, Lester W. – Computers & Education, 2003
Metadatabase modeling and design integrate process modeling and data modeling methodologies. Both are core topics in the information technology (IT) curriculum. Learning these topics has been an important pedagogical issue to the core studies for management information systems (MIS) and computer science (CSc) students. Unfortunately, the learning…
Descriptors: Self Efficacy, Computer Software, Management Information Systems, Computers
Illinois State Univ., Normal. – 1987
This guide, which is one in the "Exploration" series of curriculum guides intended to assist junior high and middle school industrial educators in helping their students explore diverse industrial situations and technologies used in industry, deals with exploring computer technology. The following topics are covered in the individual…
Descriptors: Behavioral Objectives, Computer Literacy, Computer Oriented Programs, Computer Science
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers