Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 19 |
Descriptor
Source
Author
Publication Type
Journal Articles | 17 |
Reports - Descriptive | 10 |
Reports - Research | 8 |
Speeches/Meeting Papers | 3 |
Collected Works - Proceedings | 2 |
Books | 1 |
Dissertations/Theses -… | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 20 |
Postsecondary Education | 13 |
Elementary Secondary Education | 1 |
Audience
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ajay Kumar Singh; Mukesh Kumar Meena – Education and Information Technologies, 2024
The objective of this study was to analyze the gap in expected benefits and actual benefits of virtual classrooms used at the time of nationwide lockdown for the teaching-learning process for faculty members and students in higher education during the COVID-19 pandemic. A total of 893 responses have been used for this study. The overall mean of…
Descriptors: COVID-19, Pandemics, Foreign Countries, College Faculty
Jordi Guitart; Juan José Costa – Interactive Learning Environments, 2024
The pandemic situation banned the presence of teachers and students in the classrooms disrupting the typical teaching process. Videoconferencing services have been used successfully for lectures, but they are insufficient for hands-on laboratories where the physical presence is a requirement (i.e. to access specific hardware). Enabling remote…
Descriptors: Distance Education, Laboratories, Computer Networks, Videoconferencing
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Sawyer, Thomas Scott – ProQuest LLC, 2013
The purpose of this study was to determine the availability of Internet access for students attending East Tennessee State University during the fall semester 2013. It has been unknown to what degree broadband access is available in the East Tennessee State University service area that includes counties in East Tennessee, Southwest Virginia, and…
Descriptors: Internet, College Students, Access to Information, Access to Computers
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Duan, Yuchao – International Association for Development of the Information Society, 2016
Cloud computing is considered a new frontier in the field of computing, as this technology comprises three major entities namely: software, hardware and network. The collective nature of all these entities is known as the Cloud. This research aims to examine the impacts of various aspects namely: cloud computing, sustainability, performance…
Descriptors: Higher Education, Internet, Educational Technology, Technology Uses in Education
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Miseviciene, Regina; Ambraziene, Danute; Tuminauskas, Raimundas; Pažereckas, Nerijus – Informatics in Education, 2012
Many factors influence education nowadays. Educational institutions are faced with budget cuttings, outdated IT, data security management and the willingness to integrate remote learning at home. Virtualization technologies provide innovative solutions to the problems. The paper presents an original educational infrastructure using virtualization…
Descriptors: Computer Simulation, Universities, College Students, College Faculty
Chaputula, Aubrey Harvey – Program: Electronic Library and Information Systems, 2012
Purpose: The purpose of this research is to look at the state, adoption and use of ICTs by students and academic staff at Mzuzu University. Design/methodology/approach: The research used a survey method whose study population included students, academic and library staff. Data for the study were collected using an interview guide and…
Descriptors: Foreign Countries, College Students, College Faculty, Computer Uses in Education
Cabrera-Lozoya, Andres; Cerdan, Fernando; Cano, Maria-Dolores; Garcia-Sanchez, Diego; Lujan, Sergio – Computers & Education, 2012
Current e-learning forms are commonly based on improving the learning process through the enhancement of certain skills in students, such as collaborative, competitive or problem-based learning. However, it seems that there is still no e-learning "formula" that gathers the implementation of a number of more generic educational principles in a…
Descriptors: Electronic Learning, Educational Principles, Learning Modalities, Problem Based Learning
Cismaru, Romulus; Cismaru, Magdalena – Journal of College Teaching & Learning, 2011
Laptop use in class is a characteristic of universities that is changing rapidly. Although much of the attention and research regarding this issue has focused on the debate of whether to impose mandatory laptop programs, the reality of wireless campuses allows students to use their laptops in class for class related and non-class related…
Descriptors: Student Attitudes, Universities, Laptop Computers, Foreign Countries
Young, Jeffrey R. – Chronicle of Higher Education, 2008
The author discusses the gossip Web site Juicy Campus. Although many students express concern that potential employers who see the cite may decline to hire individuals after reading gossip-filled allegations, or that their social lives are in tatters over the mean-spirited, anonymous messages posted about them, because the site has no affiliation…
Descriptors: Publicity, Interpersonal Communication, Internet, Web Sites
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Previous Page | Next Page »
Pages: 1 | 2