Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 15 |
Descriptor
Source
Author
Byramjee, Framarz | 1 |
Capo, Berta | 1 |
DeBlois, Peter D. | 1 |
Deblois, Peter B. | 1 |
Dempsey, Bert J., Ed. | 1 |
Ennis-Cole, Demetria | 1 |
Hung, Jason | 1 |
Jokela, Paivi | 1 |
Jones, Paul, Ed. | 1 |
Jung, I. Y. | 1 |
Karim, Reza | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 13 |
Postsecondary Education | 8 |
Elementary Secondary Education | 4 |
Adult Education | 2 |
Two Year Colleges | 2 |
High Schools | 1 |
Middle Schools | 1 |
Audience
Administrators | 2 |
Teachers | 2 |
Practitioners | 1 |
Location
Brazil | 2 |
California | 2 |
Singapore | 2 |
Asia | 1 |
Australia | 1 |
Bangladesh | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Office of Educational Technology, US Department of Education, 2023
Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This "School Leader Digital Learning Guide" is a resource to help school leaders consider, plan, fund, implement, maintain, and adapt…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Education Week, 2021
During the past year, teachers have pushed their technology skills to the next level, improving their understanding of how to use learning management systems effectively; integrating digital curricula, online assessments, and interactive games into learning; and upgrading their skills for using modern communication tools such as Zoom. This new…
Descriptors: COVID-19, Pandemics, Elementary Secondary Education, Educational Technology
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Rahman, Monsurur; Karim, Reza; Byramjee, Framarz – Journal of International Education Research, 2015
Many educational institutions in the United States are currently offering programs through distance learning, and that trend is rising. In almost all spheres of education a developing country like Bangladesh needs to make available the expertise of the most qualified faculty to her distant people. But the fundamental question remains as to whether…
Descriptors: Foreign Countries, Distance Education, Developing Nations, Educational Benefits
California Community Colleges, Chancellor's Office, 2014
This 16th annual report highlights up-to-date information on the programs supported through the Chancellor's Office Telecommunications and Technology Infrastructure Program (TTIP). To summarize 2012-13, one would describe it as a year of planning and preparation. The system-wide budget cuts of the past few years, reports of impacted classes, staff…
Descriptors: Community Colleges, Telecommunications, Technology Integration, Technology Uses in Education
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
American Journal of Distance Education, 2010
David Foster is the founder of Kryterion, an Internet test administration company, and currently serves there as chief scientist and executive vice president. He is the author of numerous articles for industry trade journals and textbooks and sits on the Council for the International Test Commission. In this interview, Foster talks about his…
Descriptors: Test Construction, High Stakes Tests, Educational Technology, Interviews
Jung, I. Y.; Yeom, H. Y. – IEEE Transactions on Education, 2009
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Descriptors: Virtual Classrooms, Internet, Computer Security, Computer Uses in Education
Jokela, Paivi; Karlsudd, Peter – Journal of Information Technology Education, 2007
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Descriptors: Higher Education, Plagiarism, Distance Education, Confidentiality
Smith, Shana Shiang-Fong – Journal of Technology Studies, 2004
Due to the now widespread use of the Internet, most companies now require computer aided design (CAD) tools that support distributed collaborative design on the Internet. Such CAD tools should enable designers to share product models, as well as related data, from geographically distant locations. However, integrated collaborative design…
Descriptors: Intellectual Property, Internet, Distance Education, Computer Assisted Design
Lawhon, Tommie; Ennis-Cole, Demetria; Lawhon, David C. – Community College Journal of Research & Practice, 2006
Practical information on the necessity for community colleges, instructors, and students to understand and abide by the copyright laws is essential. Whether developing, structuring, maintaining, or presenting courses, or instructing students on the development of their own papers, one must be knowledgeable about plagiarism, the Fair Use Act, and…
Descriptors: Copyrights, Plagiarism, Distance Education, Community Colleges
McGreal, Rory – International Review of Research in Open and Distance Learning, 2004
The Internet is the world's largest knowledge common and the information source of first resort. Much of this information is open and freely available. However, there are organizations and companies today that are trying to close off the Internet commons and make it proprietary. These are the "copyright controllers." The preservation of the…
Descriptors: Copyrights, Information Sources, Internet, Ethics

Mudge, Stephen M. – Innovations in Education and Training International, 1999
Discusses advantages and disadvantages of using the Internet for delivering teaching modules and makes recommendations for successful use of the Internet. Highlights include the availability of information at all times and from remote locations, multimedia capabilities, infrastructure needed, security issues, updating, needed skills, and…
Descriptors: Access to Information, Computer Assisted Instruction, Computer Literacy, Computer Security
Previous Page | Next Page ยป
Pages: 1 | 2