NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 127 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas N. – Journal of Information Systems Education, 2020
In the fields of information technology and information systems, faculty must consistently adjust curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research explores the knowledge and…
Descriptors: Job Skills, Technological Literacy, Employment Qualifications, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Martzos, Theodoros G.; Dinopoulou, Pelagia; Okalidou, Areti – Sign Language Studies, 2021
While societies have become increasingly dependent on both internet- and information technology-based knowledge retrieval and applications and as social media has become an inextricable aspect of most people's daily lives, a keen interest has emerged regarding the impact that these technologies have on Deaf people's lives. This article describes…
Descriptors: Social Networks, Deafness, Social Media, Adults
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ashmarina, Svetlana I.; Khasaev, Gabibulla R.; Mantulenko, Valentina V.; Kasarin, Stanislav V.; Dorozhkin, Evgenij M. – International Journal of Environmental and Science Education, 2016
The relevance of the investigated problem is caused by the need to assess the implementation of informatization level of the region and the insufficient development of the theoretical, content-technological, scientific and methodological aspects of the assessment of the region's information potential. The aim of the research work is to develop a…
Descriptors: Information Technology, Communications, Information Networks, Information Security
Guerry, Richard – Education Digest: Essential Readings Condensed for Quick Review, 2012
Most discussions about keeping kids safe online center around two issues: (1) With the rapid development and dissemination of digital technology, how can we stay ahead of what our students are doing?; and (2) What controls are available to prevent students from visiting inappropriate sites? These are reasonable questions, but they ignore two…
Descriptors: Internet, Accountability, Bullying, Computers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Turkle, Sherry – Continuing Higher Education Review, 2011
The author has been a witness to the birth of the personal computer culture, with its intense one-on-one relationships with machines, and then to the development of the networked culture, with people using the computer to communicate with each other. In her most recent work on the revolutions in social networking and sociable robotics, she sees a…
Descriptors: Intimacy, Computer Networks, Social Networks, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Frydenberg, Mark – Interactive Technology and Smart Education, 2013
Purpose: The purpose of this paper is to investigate the impact of transforming a traditional university computer lab to create a collaborative learning community known as the CIS Sandbox, by remodeling a physical space and supporting it with a virtual presence through the use of social media tools. The discussion applies Selander's "designs for…
Descriptors: Educational Technology, Web Sites, Electronic Publishing, Entrepreneurship
Rangan, Prahalad – ProQuest LLC, 2010
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
Descriptors: Computer Security, Topology, Computer Networks, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Oreglia, Elisa – ProQuest LLC, 2013
In the mid-2000s, China began a set of policies to "informatize" the countryside, i.e. to bring Information and Communication Technologies (ICT) to rural residents in order to improve their economic conditions. These policies posit the countryside as a world of "less," compared to urban areas, and they are framed in terms of…
Descriptors: Foreign Countries, Rural Areas, Urban Areas, Information Technology
Ireh, Maduakolam – School Business Affairs, 2010
School districts need adequate financial resources to purchase hardware and software, wire their buildings to network computers and other information and communication devices, and connect to the Internet to provide students, teachers, and other school personnel with adequate access to technology. Computers and other peripherals, particularly,…
Descriptors: Purchasing, Computer Software, Educational Technology, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Brown, Robert A. – New England Journal of Higher Education, 2012
The Northeast United States just experienced one of the region's worst natural disasters. Fortunately, because of the confluence of modern computing power and scientific computing methods, weather forecasting models predicted Sandy's very complicated trajectory and development with a precision that would not have been possible even a decade ago.…
Descriptors: Computers, Prediction, Engineering, Computer Assisted Design
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9