Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 25 |
| Since 2017 (last 10 years) | 53 |
| Since 2007 (last 20 years) | 241 |
Descriptor
| Computer Networks | 941 |
| Information Technology | 941 |
| Higher Education | 348 |
| Telecommunications | 256 |
| Information Networks | 244 |
| Technological Advancement | 198 |
| Internet | 193 |
| Foreign Countries | 175 |
| Educational Technology | 174 |
| Computer Uses in Education | 169 |
| Access to Information | 133 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 93 |
| Administrators | 54 |
| Policymakers | 27 |
| Media Staff | 18 |
| Teachers | 12 |
| Researchers | 6 |
| Students | 6 |
| Community | 2 |
Location
| United States | 28 |
| Canada | 21 |
| United Kingdom | 17 |
| Australia | 11 |
| New York | 11 |
| California | 9 |
| Ohio | 9 |
| Indiana | 8 |
| Spain | 7 |
| Finland | 6 |
| Florida | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
| Fast Response Survey System | 1 |
| Peabody Individual… | 1 |
| Program for International… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Dogan, Gulustan – ProQuest LLC, 2013
Trust can be an important component of wireless sensor networks for believability of the produced data and historical value is a crucial asset in deciding trust of the data. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. Provenance can…
Descriptors: Computer Networks, Telecommunications, Credibility, Information Technology
Zhou, Shan – ProQuest LLC, 2013
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…
Descriptors: Computer Networks, Telecommunications, Information Technology, Mathematics
Kok, Illasha; Beter, Petra; Esterhuizen, Hennie – International Journal of Distance Education Technologies, 2018
Fragmented connectivity in South Africa is the dominant barrier for digitising initiatives. New insights surfaced when a university-based nursing programme introduced tablets within a supportive network learning environment. A qualitative, explorative design investigated adult nurses' experiences of the realities when moving from paper-based…
Descriptors: Nurses, Handheld Devices, Information Technology, Blended Learning
Nychis, George P. – ProQuest LLC, 2013
In the past two decades, we have seen an unprecedented rise in unlicensed wireless devices and applications of wireless technology. To meet various application constraints, we continually customize the radios and their protocols to the application domain which has led to significant diversity in spectrum use. Unfortunately, this diversity (coupled…
Descriptors: Computer Networks, Telecommunications, Radio, Information Technology
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Dawadi, Saraswati; Giri, Ram Ashish; Simkhada, Padam – Online Submission, 2020
The pandemic spread of Novel Coronavirus, also known as COVID-19, has significantly disrupted every aspects of human life, including education. The alarming spread of the virus caused a havoc in the educational system forcing educational institutions to shut down. According to a UNESCO report, 1.6 billion children across 191 countries have been…
Descriptors: Foreign Countries, COVID-19, Coping, Distance Education
Frolova, Elena V.; Ryabova, Tatyana M.; Rogach, Olga V. – European Journal of Contemporary Education, 2019
The dynamic development of information and communication technologies, the strengthening of the public demand for digitalization of various spheres of life, orient the Moscow education system towards the active introduction of digital technologies and high-tech educational environment development. The purpose of this article is to analyze the…
Descriptors: Information Technology, Technology Integration, Program Implementation, Barriers
Bandara, H. M. N. Dilum – ProQuest LLC, 2012
Resource-rich computing devices, decreasing communication costs, and Web 2.0 technologies are fundamentally changing the way distributed applications communicate and collaborate. With these changes, we envision Peer-to-Peer (P2P) systems that will allow for the integration and collaboration of peers with diverse capabilities to a virtual community…
Descriptors: Computer Networks, Cooperation, Information Technology
Liu, Meredith – Clayton Christensen Institute for Disruptive Innovation, 2014
To illuminate the possibilities for next-generation assessments in K-12 schools, this case study profiles the Cisco Networking Academy, which creates comprehensive online training curriculum to teach networking skills. Since 1997, the Cisco Networking Academy has served more than five million high school and college students and now delivers…
Descriptors: Educational Assessment, Computer Networks, Information Technology, Elementary Secondary Education
Galanek, Joseph D.; Gierdowski, Dana C.; Brooks, D. Christopher – EDUCAUSE, 2018
For 15 years, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology (IT) and higher education's most important end users, undergraduate students. This year's report includes inclusion of the perspectives of students with learning and physical disabilities on how their institutions respond to their…
Descriptors: Undergraduate Students, Information Technology, Computer Uses in Education, Access to Computers
Osaheni Oni; Kelly Odaro-Ekhaguebo; Emmanuel Akpoduado – Journal of Pedagogical Research, 2018
This study assessed Information and Communication Technology (ICT) Proficiency of Secondary School Teachers in Auchi Polytechnic Staff School. The study employed a descriptive surveyed design and purposive sampling techniques to select fifty-three (53) respondents for the study. A structured questionnaire was used to collect data. The data…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Technology, Teacher Evaluation
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems

Direct link
Peer reviewed
