NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 75 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Rangan, Prahalad – ProQuest LLC, 2010
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
Descriptors: Computer Security, Topology, Computer Networks, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Turkle, Sherry – Continuing Higher Education Review, 2011
The author has been a witness to the birth of the personal computer culture, with its intense one-on-one relationships with machines, and then to the development of the networked culture, with people using the computer to communicate with each other. In her most recent work on the revolutions in social networking and sociable robotics, she sees a…
Descriptors: Intimacy, Computer Networks, Social Networks, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Johnson, Doug – Learning & Leading with Technology, 2010
Web-based applications offer teachers, students, and school districts a convenient way to accomplish a wide range of tasks, from accounting to word processing, for free. Cloud computing has the potential to offer staff and students better services at a lower cost than the technology deployment models they're using now. Saving money and improving…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Peer reviewed Peer reviewed
Direct linkDirect link
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Ireh, Maduakolam – School Business Affairs, 2010
School districts need adequate financial resources to purchase hardware and software, wire their buildings to network computers and other information and communication devices, and connect to the Internet to provide students, teachers, and other school personnel with adequate access to technology. Computers and other peripherals, particularly,…
Descriptors: Purchasing, Computer Software, Educational Technology, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, John T. – EDUCAUSE Quarterly, 2009
A "carbon footprint" is the "total set of greenhouse gas emissions caused directly and indirectly by an (individual, event, organization, and product) expressed as CO2" emissions. Since CO2 emissions are indicative of energy use, the higher the associated CO2 emissions, typically the greater the associated costs. A typical desktop PC system…
Descriptors: Energy Conservation, Energy Management, Computers, Cost Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Diffin, Jennifer; Chirombo, Fanuel; Nangle, Dennis; de Jong, Mark – Journal of Web Librarianship, 2010
This article explains how the document management team (circulation and interlibrary loan) at the University of Maryland University College implemented Microsoft's SharePoint product to create a central hub for online collaboration, communication, and storage. Enhancing the team's efficiency, organization, and cooperation was the primary goal.…
Descriptors: Distance Education, Cooperation, Educational Technology, Library Services
Ranguelov, Stanislav; Horvath, Anna; Dalferth, Simon; Noorani, Sogol – Education, Audiovisual and Culture Executive Agency, European Commission, 2011
This report on Key Data on Learning and Innovation through ICT at School in Europe 2011 builds on the previous Eurydice publications on information and communication technology in schools in Europe. It also aims to extend the theoretical framework by looking not only at the teaching and learning of ICT but also at the use of ICT to promote…
Descriptors: Educational Technology, Information Technology, Educational Innovation, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5