Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Networks | 10 |
Internet | 10 |
Undergraduate Students | 10 |
Computer Science Education | 5 |
Student Attitudes | 5 |
Computer Science | 4 |
Graduate Students | 4 |
Higher Education | 4 |
Telecommunications | 4 |
Access to Computers | 3 |
Comparative Analysis | 3 |
More ▼ |
Source
IEEE Transactions on Education | 2 |
International Journal of… | 2 |
E-Learning and Digital Media | 1 |
EDUCAUSE | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Journal of Information… | 1 |
Author
Publication Type
Journal Articles | 7 |
Reports - Research | 6 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Elementary Secondary Education | 1 |
Audience
Location
Kazakhstan | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Georgia | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Muthukumar, N.; Srinivasan, Seshadhri; Subathra, B.; Ramkumar, K. – IEEE Transactions on Education, 2021
Contribution: This article explores how the Industrial Internet of Things (IIoT) could be leveraged to enhance the teaching/learning experience of advanced control techniques [e.g., model-predictive control (MPC)] for complex systems (nonlinear and multivariable) for undergraduate students. Background: The IIoTs' features, such as ubiquitous…
Descriptors: Undergraduate Students, College Science, Science Instruction, Internet
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Galanek, Joseph D.; Gierdowski, Dana C.; Brooks, D. Christopher – EDUCAUSE, 2018
For 15 years, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology (IT) and higher education's most important end users, undergraduate students. This year's report includes inclusion of the perspectives of students with learning and physical disabilities on how their institutions respond to their…
Descriptors: Undergraduate Students, Information Technology, Computer Uses in Education, Access to Computers
Zhamanov, Azamat; Yoo, Seong-Moo; Sakhiyeva, Zhulduz; Zhaparov, Meirambek – International Journal of Information and Communication Technology Education, 2018
Students nowadays are hard to be motivated to study lessons with traditional teaching methods. Computers, smartphones, tablets and other smart devices disturb students' attentions. Nevertheless, those smart devices can be used as auxiliary tools of modern teaching methods. In this article, the authors review two popular modern teaching methods:…
Descriptors: Program Implementation, Program Evaluation, Blended Learning, Internet
Chawinga, Winner Dominic – E-Learning and Digital Media, 2016
It is understood that microblogging (tweeting) which is a form of Web 2.0, has been a centre of attraction in some institutions of higher education. However, despite its hype and pomp as reported by some scholars in developed countries, integration of Twitter in a classroom environment in developing countries is just beginning to flourish. In…
Descriptors: Social Media, Electronic Publishing, Course Content, Foreign Countries
Hamblen, J. O.; van Bekkum, G. M. E. – IEEE Transactions on Education, 2013
This paper describes a new approach for a course and laboratory designed to allow students to develop low-cost prototypes of robotic and other embedded devices that feature Internet connectivity, I/O, networking, a real-time operating system (RTOS), and object-oriented C/C++. The application programming interface (API) libraries provided permit…
Descriptors: Robotics, Engineering Education, Computer Science Education, Internet
Rice, George; Bowman, Michael – Journal of Information Technology Education, 2007
Children in the back seat on a long trip are not the only ones asking the question "Are we there yet?" At Murray State University (MSU) and other universities starting new programs, the question becomes one of validation of the program. In the late 90s, MSU, a midsize university, was entrusted with the responsibility of developing a program of…
Descriptors: Information Systems, Computers, Information Technology, Computer Science
Walker, Ellen; Rodger, Susan – 1996
The PipeLINK program seeks to attract and retain women and girls in computer science careers. Aimed at girls and women from the high school through the Ph.D. levels, the program suggests activities to aid participants at each level, connect students with role models and mentors, and provides an introduction to a wide variety of computer science…
Descriptors: Career Choice, Computer Networks, Computer Science, Computer Science Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers