Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Networks | 4 |
Higher Education | 4 |
Holistic Approach | 4 |
Information Technology | 4 |
Computer Security | 2 |
Computer Software | 2 |
Cost Effectiveness | 2 |
Data Analysis | 2 |
Decision Making | 2 |
Educational Objectives | 2 |
Elementary Secondary Education | 2 |
More ▼ |
Author
Eric Shook | 1 |
Ernst, David J. | 1 |
Forrest J. Bowlick | 1 |
Karen K. Kemp | 1 |
Segall, Peter | 1 |
Shana Crosson | 1 |
Zeltser, Lenny | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 2 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Audience
Administrators | 1 |
Practitioners | 1 |
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Forrest J. Bowlick; Karen K. Kemp; Shana Crosson; Eric Shook – Geography Teacher, 2024
Cyberinfrastructure (CI) empowers the foundational computation resources underlying data analytics, spatial modeling, and many other domains serving the growing knowledge economy in the United States. In every part of these interactions with CI, questions of how to seamlessly integrate CI training into educational programs exist. In this article,…
Descriptors: Knowledge Economy, Global Approach, World Problems, Multiple Literacies
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Ernst, David J.; Segall, Peter – CAUSE/EFFECT, 1995
Limited financial resources of colleges and universities make it more important than ever to develop a coordinated, institution-wide process to link academic priorities and expenditures with the technological infrastructure necessary to support objectives. Trade-offs must be made across the institution rather than simply within the traditional…
Descriptors: Budgeting, College Administration, College Planning, Computer Networks
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers