NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
No Child Left Behind Act 20011
Assessments and Surveys
Schools and Staffing Survey…1
What Works Clearinghouse Rating
Showing 1 to 15 of 216 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Enes Küçük; Fidaye Cincil; Yasemin Karal – Journal of Theoretical Educational Science, 2025
AI technology, which is becoming more widespread day by day, also affects education and training processes. The use of AI tools in educational environments provides many benefits to teachers and students. However, the use of AI in education also raises some ethical concerns. The aim of this study was to reveal the ethical issues arising from the…
Descriptors: Ethics, Teaching Methods, Learning Analytics, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Çekiç, Ahmet; Bakla, Arif – International Online Journal of Education and Teaching, 2021
The Internet and the software stores for mobile devices come with a huge number of digital tools for any task, and those intended for digital formative assessment (DFA) have burgeoned exponentially in the last decade. These tools vary in terms of their functionality, pedagogical quality, cost, operating systems and so forth. Teachers and learners…
Descriptors: Formative Evaluation, Futures (of Society), Computer Assisted Testing, Guidance
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Firat, Mehmet; Altinpulluk, Hakan; Kilinç, Hakan – Asian Association of Open Universities Journal, 2021
Purpose: This study aims to investigate the preferences of 96 educational researchers on the use of digital technologies in scientific research. Design/methodology/approach: The study was designed as a quantitative-dominant sequential explanatory mixed-method research. Findings: Despite the spreading use of advanced technologies of big data and…
Descriptors: Educational Researchers, Preferences, Scientific Research, Technology Uses in Education
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
da Silveira, Pedro Rodrigo Castro – ProQuest LLC, 2014
This thesis describes the development and deployment of a cyberinfrastructure for distributed high-throughput computations of materials properties at high pressures and/or temperatures--the Virtual Laboratory for Earth and Planetary Materials--VLab. VLab was developed to leverage the aggregated computational power of grid systems to solve…
Descriptors: Computers, Computer Simulation, Science Laboratories, Astronomy
Peer reviewed Peer reviewed
Direct linkDirect link
Malik, Kaleem Razzaq; Ahmad, Tauqir – EURASIA Journal of Mathematics, Science & Technology Education, 2017
Electronic Assessment (E-Assessment) also known as computer aided assessment for the purposes involving diagnostic, formative or summative examining using data analysis. Digital assessments come commonly from social, academic, and adaptive learning in machine readable forms to deliver the machine scoring function. To achieve real-time and smart…
Descriptors: Computer Assisted Testing, Databases, Case Studies, Research Methodology
Yagci, Mustafa; Ünal, Menderes – Online Submission, 2014
A design and application of adaptive online exam system are carried out in this paper. Adaptive exam systems determine different question sets automatically and interactively for each student and measure their competence on a certain area of discipline instead of comparing their gains with each other. Through an adaptive exam technique, a…
Descriptors: Adaptive Testing, Expertise, Information Security, Databases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kuswoyo, Heri; Rido, Akhyar; Mandasari, Berlinda – International Association for Development of the Information Society, 2022
Due to COVID-19 pandemic, educational departments such schools, colleges, and universities have been experiencing significant disruptions. All teaching and learning activities of face-to-face learning have switched to online learning. This study provides a systemic review of the literature with the aim to investigate the effectiveness, challenges,…
Descriptors: Research Reports, Online Courses, English (Second Language), Second Language Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jaffarian, Michael – Research-publishing.net, 2014
This chapter consists of a short history of the impact of computer technology on Christian evangelical mission research from the 1970's to the present. The trail winds through World Vision, MARC, the "World Christian Encyclopedia," "Operation World," SIL, OC International, DAWN, Global Mapping International, the AD2000 and…
Descriptors: Influence of Technology, Computer Uses in Education, Christianity, Religious Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chen, Yong; He, Wu – International Review of Research in Open and Distance Learning, 2013
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Descriptors: Computer Security, Risk, Online Courses, Electronic Publishing
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Biletskiy, Yevgen; Baghi, Hamidreza; Steele, Jarrett; Vovk, Ruslan – Interactive Technology and Smart Education, 2012
Purpose: Presently, searching the internet for learning material relevant to ones own interest continues to be a time-consuming task. Systems that can suggest learning material (learning objects) to a learner would reduce time spent searching for material, and enable the learner to spend more time for actual learning. The purpose of this paper is…
Descriptors: Internet, Search Engines, Online Searching, Electronic Libraries
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  15