Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 26 |
Descriptor
Computer Networks | 44 |
Information Technology | 44 |
Teaching Methods | 44 |
Telecommunications | 17 |
Educational Technology | 16 |
Foreign Countries | 14 |
Computer Software | 13 |
Higher Education | 13 |
Internet | 13 |
Technology Integration | 13 |
Computer Uses in Education | 12 |
More ▼ |
Source
Author
Adams, Dennis | 1 |
Agee, Kelly, Ed. | 1 |
Archer, Ricky | 1 |
Arif Alam | 1 |
Arnold, Erik P. | 1 |
Bates, Tony | 1 |
Battisti, F. | 1 |
Bhagyavati | 1 |
Boato, G. | 1 |
Brudvik, Ole C. | 1 |
Carli, M. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 11 |
Elementary Secondary Education | 8 |
Postsecondary Education | 7 |
High Schools | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Middle Schools | 1 |
Location
China | 2 |
Israel | 2 |
Italy | 2 |
Japan | 2 |
Pakistan | 2 |
United Kingdom | 2 |
United States | 2 |
Arizona | 1 |
Arkansas | 1 |
Asia | 1 |
Australia | 1 |
More ▼ |
Laws, Policies, & Programs
Carl D Perkins Vocational and… | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
ACT Assessment | 1 |
Program for International… | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Nisar Ahmad; Arif Alam; Ikram Shah – Knowledge Management & E-Learning, 2024
Information Communication Technology (ICT) is ubiquitous in the 21st century, hence both educators and learners need to integrate relevant ICT resources in their teaching and learning practices, to meet stakeholder's expectations and keep abreast with the race of technological advancement. The current research focuses on the analysis of ICT…
Descriptors: Foreign Countries, Information Technology, Communications, Computer Mediated Communication
Parlakkiliç, Alaattin – International Journal of Modern Education Studies, 2019
Today, digital transformation is changing the educational and social life rapidly. In contrast, organizations and educational institutions, developers, and end users do not benefit from cloud-based mobile technologies to the desired level. Mobile systems are used extensively for educational purposes in the Internet of Things (IoT) environment, and…
Descriptors: Computer Software, Computer Science Education, Internet, Information Technology
Hill, Janette; Nuss, Michelle; Cervero, Ronald; Gaines, Julie; Middendorf, Bruce; Mishra, Supriya – Journal of Interactive Learning Research, 2019
The third year clerkship is an exciting yet challenging time for medical students (Cooke, Irby, & O'Brien, 2010). For the first time, students spend significant time in clinical settings (e.g., hospitals) assisting in the daily care of patients. Obtaining just-in-time and at point-of-care information and resources (Author, 2009) is one…
Descriptors: Patients, Handheld Devices, Graduate Medical Education, Medical Services
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Dawadi, Saraswati; Giri, Ram Ashish; Simkhada, Padam – Online Submission, 2020
The pandemic spread of Novel Coronavirus, also known as COVID-19, has significantly disrupted every aspects of human life, including education. The alarming spread of the virus caused a havoc in the educational system forcing educational institutions to shut down. According to a UNESCO report, 1.6 billion children across 191 countries have been…
Descriptors: Foreign Countries, COVID-19, Coping, Distance Education
Frolova, Elena V.; Ryabova, Tatyana M.; Rogach, Olga V. – European Journal of Contemporary Education, 2019
The dynamic development of information and communication technologies, the strengthening of the public demand for digitalization of various spheres of life, orient the Moscow education system towards the active introduction of digital technologies and high-tech educational environment development. The purpose of this article is to analyze the…
Descriptors: Information Technology, Technology Integration, Program Implementation, Barriers
Osaheni Oni; Kelly Odaro-Ekhaguebo; Emmanuel Akpoduado – Journal of Pedagogical Research, 2018
This study assessed Information and Communication Technology (ICT) Proficiency of Secondary School Teachers in Auchi Polytechnic Staff School. The study employed a descriptive surveyed design and purposive sampling techniques to select fifty-three (53) respondents for the study. A structured questionnaire was used to collect data. The data…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Technology, Teacher Evaluation
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Arnold, Erik P. – ProQuest LLC, 2014
A multiple-case qualitative study of five school districts that had implemented various large-scale technology initiatives was conducted to describe what superintendents do to gain acceptance of those initiatives. The large-scale technology initiatives in the five participating districts included 1:1 District-Provided Device laptop and tablet…
Descriptors: Superintendents, Case Studies, Qualitative Research, School Districts
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Ranguelov, Stanislav; Horvath, Anna; Dalferth, Simon; Noorani, Sogol – Education, Audiovisual and Culture Executive Agency, European Commission, 2011
This report on Key Data on Learning and Innovation through ICT at School in Europe 2011 builds on the previous Eurydice publications on information and communication technology in schools in Europe. It also aims to extend the theoretical framework by looking not only at the teaching and learning of ICT but also at the use of ICT to promote…
Descriptors: Educational Technology, Information Technology, Educational Innovation, Teaching Methods
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study