Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 5 |
Industry | 5 |
Internet | 5 |
Computer Security | 2 |
Curriculum | 2 |
Information Technology | 2 |
Audits (Verification) | 1 |
Business Administration… | 1 |
Classroom Environment | 1 |
College Science | 1 |
Competition | 1 |
More ▼ |
Source
IEEE Transactions on Education | 2 |
Journal of Education for… | 1 |
Journal of Information… | 1 |
School Business Affairs | 1 |
Author
Battisti, F. | 1 |
Boato, G. | 1 |
Carli, M. | 1 |
Hilken, Ralph | 1 |
Muthukumar, N. | 1 |
Neri, A. | 1 |
Pant, Vik | 1 |
Ramkumar, K. | 1 |
Srinivasan, Seshadhri | 1 |
Subathra, B. | 1 |
Wagner, William P. | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
Finland | 1 |
France | 1 |
Italy | 1 |
Romania | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Muthukumar, N.; Srinivasan, Seshadhri; Subathra, B.; Ramkumar, K. – IEEE Transactions on Education, 2021
Contribution: This article explores how the Industrial Internet of Things (IIoT) could be leveraged to enhance the teaching/learning experience of advanced control techniques [e.g., model-predictive control (MPC)] for complex systems (nonlinear and multivariable) for undergraduate students. Background: The IIoTs' features, such as ubiquitous…
Descriptors: Undergraduate Students, College Science, Science Instruction, Internet
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Wagner, William P.; Pant, Vik; Hilken, Ralph – Journal of Information Technology Education, 2008
eXtensible Markup Language (XML) is a new technology that is currently being extolled by many industry experts and software vendors. Potentially it represents a platform independent language for sharing information over networks in a way that is much more seamless than with previous technologies. It is extensible in that XML serves as a "meta"…
Descriptors: Internet, Computer Software, Information Technology, Computer Networks
Wodarz, Nan – School Business Affairs, 1999
Internet II will take three to five years to develop, will be 1,000 times faster than Internet I, and will cost at least $500 million. Key developers are universities, several federal agencies, and leading computer and telecommunications firms. Internet II will support face-to-face communications technology to facilitate "real-time" networking.…
Descriptors: Computer Networks, Costs, Elementary Secondary Education, Federal Government