NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)0
Since 2017 (last 10 years)1
Since 2007 (last 20 years)26
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sirakaya, Didem Alsancak – International Journal of Computer Science Education in Schools, 2020
This research aims to determine the change in students' computational thinking skills according to their ICT and mobile technology experience and frequency of use. The sample of the study, designed with the survey model, consisted of 269 students attending a vocational school of higher education. Data were collected using the Computational…
Descriptors: Thinking Skills, Information Technology, Handheld Devices, Electronic Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Baehr, Craig; Lang, Susan M. – Journal of Technical Writing and Communication, 2012
This article traces the influences of hypertext theory throughout the various genres of online publication in technical communication. It begins with a look back at some of the important concepts and theorists writing about hypertext theory from the post-World War II era, to the early years of the World Wide Web 2.0, and the very differing notions…
Descriptors: Technical Writing, Hypermedia, Information Technology, Internet
Pai, Vinay – ProQuest LLC, 2011
The increasing popularity of high-bandwidth Internet connections has enabled new applications like the online delivery of high-quality audio and video content. Conventional server-client approaches place the entire burden of delivery on the content provider's server, making these services expensive to provide. A peer-to-peer approach allows end…
Descriptors: Video Technology, Program Effectiveness, Internet, Information Technology
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Sardone, Nancy B. – Journal of Information Technology Education, 2011
The confluence of powerful technologies of computers and network connectivity has brought explosive growth to the field of Information Technology (IT). The problem presented in this study is whether the type of learning environment where IT concepts are taught to undergraduates has a relationship to the development of IT fluency and course…
Descriptors: Information Technology, Undergraduate Students, Constructivism (Learning), Educational Environment
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lim, Billy; Hosack, Bryan; Vogt, Paul – Electronic Journal of e-Learning, 2012
This paper describes a framework for measuring student learning gains and engagement in a Computer Science 1 (CS 1) / Information Systems 1 (IS 1) course. The framework is designed for a CS1/IS1 course as it has been traditionally taught over the years as well as when it is taught using a new pedagogical approach with Web services. It enables the…
Descriptors: Academic Achievement, Computer Science, Internet, Information Systems
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Persinger, Jon F. – ProQuest LLC, 2010
This research study examined whether the overall effectiveness of the Information Technology Infrastructure Library (ITIL) could be predicted by measuring multiple independent variables. The primary variables studied included the number of ITIL process modules adopted and the overall ITIL "maturity level." An online survey was used to…
Descriptors: Information Technology, Program Effectiveness, Prediction, Surveys
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Bixler, Brett A.; Land, Susan M. – Journal of Educational Technology Systems, 2011
The purpose of this research was to investigate the effects of using cognitive and metacognitive prompting strategies in a web-based learning environment to engage college students in a complex, ill-structured task. The course context was a freshman/sophomore level Information Sciences and Technology course, and the topic was web design. Four…
Descriptors: College Students, Prompting, Problem Solving, Educational Environment
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Jackson, Barcus C. – ProQuest LLC, 2010
Since the 1980s, personal computer ownership has become ubiquitous, and people are increasingly using household technologies for a wide variety of purposes. Extensive research has resulted in useful models to explain workplace technology acceptance and household technology adoption. Studies have also found that the determinants underlying…
Descriptors: Self Efficacy, Ownership, Computer Uses in Education, Internet
Reinert, Gregory J. – ProQuest LLC, 2010
Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay's reported negative feedback rate of less than 1%. The…
Descriptors: Feedback (Response), Labor, Identification, Probability
Previous Page | Next Page »
Pages: 1  |  2  |  3