NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)4
Since 2006 (last 20 years)20
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 46 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Fesharaki, Mehdi N.; Fetanat, AbdolHamid; Shooshtari, Davood Farajian – Cogent Education, 2020
How is the future of the Web, as one of the most influential inventions of the twentieth century? Today, there are great conceptual gaps between the Web 2.0 (Social Web), Web 3.0 (Semantic Web), and Web 4.0 (Pragmatic Web) generations. Every generation of Web is merely an independent conceptual branch of Web and the future Web needs to benefit…
Descriptors: Information Technology, Web 2.0 Technologies, Futures (of Society), Semantics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
van Wyk, Norman; Johnston, Kevin; Möller, Klaus; Haas, Florian – Online Submission, 2020
Aim/Purpose: Academics are often requested to create and teach courses for emerging technologies with perhaps no experience or guidance on how to do so. Background: A Framework to develop IT courses for emerging technologies was created and tested to assist academics; the framework was then tested by developing an IoT course. Methodology: A…
Descriptors: Information Science Education, Information Technology, College Faculty, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Abels, Eileen G.; Howarth, Lynne C.; Smith, Linda C. – Journal of Education for Library and Information Science, 2016
An Institute of Museum and Library Services (IMLS) funded National Forum Planning Grant "Envisioning Our Information Future and How to Educate for It" brought together a diverse group of stakeholders to lay the framework for re-visioning LIS education. This article describes three take-aways from the 2015 forum: encourage wide…
Descriptors: Information Scientists, Stakeholders, Models, Library Science
Peer reviewed Peer reviewed
Direct linkDirect link
Yu, Liangzhi – Journal of Librarianship and Information Science, 2012
The term "information world" has been widely used by LIS scholars in a rather cursory manner. Building upon a range of existing concepts in LIS literature, and drawing on evidence from interviews of 40 people of different social statuses, this paper offers a redefinition of the "information worlds of individuals" concept within the framework of…
Descriptors: Access to Information, Information Seeking, Interviews, Scholarship
Peer reviewed Peer reviewed
Direct linkDirect link
Peace, A. Graham – Journal of Information Systems Education, 2011
This experience report details the use of debates in a course on Information Ethics. Formal debates have been used in academia for centuries and create an environment in which students must think critically, communicate well and, above all, synthesize and evaluate the relevant classroom material. They also provide a break from the standard…
Descriptors: Ethics, Debate, Teaching Methods, Class Activities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alghazzawi, Daniyal; Fardoun, Habib – Journal of Case Studies in Accreditation and Assessment, 2014
The 3-year migration of the computing faculty for three undergraduate programs from ad hoc teaching to three accredited programs is the focus of this paper. This journey started after numerous international accreditation organizations were surveyed, and ABET was chosen as the faculty's target. In this paper, the timelines and processes for…
Descriptors: Accreditation (Institutions), Undergraduate Study, College Faculty, Information Science Education
Bogdanovic, Zorica; Simic, Konstantin; Milutinovic, Miloš; Radenkovic, Božidar; Despotovic-Zrakic, Marijana – International Association for Development of the Information Society, 2014
This paper presents a model for conducting Internet of Things (IoT) classes based on a web-service oriented cloud platform. The goal of the designed model is to provide university students with knowledge about IoT concepts, possibilities, and business models, and allow them to develop basic system prototypes using general-purpose microdevices and…
Descriptors: Web Based Instruction, Educational Technology, College Students, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hesketh, Beryl; Griffin, Barbara; Loh, Vanessa – Journal of Vocational Behavior, 2011
This theoretical paper presents a person-environment fit framework that extends the Minnesota Theory of Work Adjustment to retirement transition and adjustment. The proposed Retirement Transition and Adjustment Framework (RTAF) also accommodates dynamic intra-individual and environment change over time, configural combinations of variables, and an…
Descriptors: Retirement, Computer Simulation, Vocational Adjustment, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Sales, Dora; Pinto, Maria – Journal of Librarianship and Information Science, 2011
This paper is part of a broader research project, the main goal of which is to provide translators with solid instruction in information literacy (IL). For this, it is important to know the views of the community of professional translators. The results of the ongoing research which we analyse in this paper provide this view, by means of a…
Descriptors: Translation, Information Literacy, Case Studies, Research Projects
Qleibo, Haider W. – ProQuest LLC, 2009
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…
Descriptors: Confidentiality, Integrity, Computer Security, Internet
Neal, Maxwell Lewis – ProQuest LLC, 2010
Biosimulation models are valuable, versatile tools used for hypothesis generation and testing, codification of biological theory, education, and patient-specific modeling. Driven by recent advances in computational power and the accumulation of systems-level experimental data, modelers today are creating models with an unprecedented level of…
Descriptors: Semantics, Measures (Individuals), Semiotics, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Terzis, Vasileios; Economides, Anastasios A. – Computers & Education, 2011
The effective development of a computer based assessment (CBA) depends on students' acceptance. The purpose of this study is to build a model that demonstrates the constructs that affect students' behavioral intention to use a CBA. The proposed model, Computer Based Assessment Acceptance Model (CBAAM) is based on previous models of technology…
Descriptors: Self Efficacy, Computer Assisted Testing, Computer Uses in Education, Intention
Peer reviewed Peer reviewed
Direct linkDirect link
Naaj, Mahmoud Abou; Nachouki, Mirna; Ankit, Ahmed – Journal of Information Technology Education: Research, 2012
Blended learning combines multiple delivery media that are designed to complement each other and promote learning and application-learned behavior (Smith & Dillon, 1999). This article reports on a study conducted in the College of Information Technology to evaluate levels of student' satisfaction with blended learning. The particular blend of…
Descriptors: Blended Learning, Participant Satisfaction, Student Attitudes, Information Technology
Bitton, Ephrat – ProQuest LLC, 2011
This dissertation explores the use of geometric and graphical models for a variety of information search and filtering applications. These models serve to provide an intuitive understanding of the problem domains and as well as computational efficiencies to our solution approaches. We begin by considering a search and rescue scenario where both…
Descriptors: Safety, Opinions, Hypothesis Testing, Intuition
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4