NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 16 to 30 of 786 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chen, Li; Xu, Yaqian – Canadian Journal of Learning and Technology, 2022
Connectivism, a learning theory that reveals a new learning in the Internet environment, has become a popular academic topic at the forefront of online learning. The MOOC Research Team at the Distance Education Research Centre at Beijing Normal University designed and developed the first massive open online course in China, adapting a connectivist…
Descriptors: Foreign Countries, Learning Theories, Educational Innovation, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Tungela, Nomawethu; Iyamu, Tiko – Education and Information Technologies, 2019
The South African government strives to increase citizens' participation in economic, political, social and trade activities through online connectivity, by providing free Wi-Fi for previously disadvantage, peri-urban communities. This was in an attempt to contribute and promote poverty alleviation, growth and economic transformation among…
Descriptors: Foreign Countries, Telecommunications, Computer Networks, Educational Technology
State Educational Technology Directors Association, 2019
Since 1993, at the regional level, the Minnesota Education Technology Networks (METN), a cooperative of regional networks, provides regional network development, support and leadership to Minnesota school districts. METN member cooperatives provide network coordination, procurement, and other support to help school districts acquire and manage…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
Peer reviewed Peer reviewed
Direct linkDirect link
GuoRong Huang; Xing Liu; Hui Sun – International Journal of Web-Based Learning and Teaching Technologies, 2024
This research evaluates the efficacy of a basketball-based teaching and training system supported by 5G technology in a wireless network environment. Initially are information about the Chinese basketball students is first gathered and then divided into a Control Group (CG) and an Experimental Group (EG). The control group uses the standard method…
Descriptors: Curriculum Development, Team Sports, Internet, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
State Educational Technology Directors Association, 2019
Connecticut is committed to ensuring scalable, high-performance, cost-efficient broadband to its public schools and libraries. The Connecticut Commission for Educational Technology (Commission), created in 2000, serves as the educational technology advisor to schools, libraries, and institutions of higher education and started with a mission to…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
State Educational Technology Directors Association, 2019
The 1990 Kentucky Education Reform Act (KERA) created the Kentucky Education Technology System (KETS) authorizing the Office of Education Technology (OET) within the Kentucky Department of Education (KDE) to provide internet access to all school districts. One of the key components included in the legislation was the development of a technology…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
DeSerranno, Allen Ronald – ProQuest LLC, 2017
Internet of Things ("IoT") systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within…
Descriptors: Computer Software, Internet, Computer Networks, Engineering
Peer reviewed Peer reviewed
Direct linkDirect link
Rodriguez, Michael; Tonyan, Joel; Wilson, Robert T. – Journal of Electronic Resources Librarianship, 2018
For electronic resources and reference librarians, fielding eresource access problems is often a daily task. A library user clicks on a link to an electronic journal article, book, or primary source and is unable to access the full text. Sometimes this problem occurs due to a lapsed subscription, a broken link, or a proxy configuration error. The…
Descriptors: Troubleshooting, Electronic Libraries, Access to Information, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Whitacre, Brian – Journal of Extension, 2019
In today's society, individuals and households without reliable Internet connections are increasingly at risk of facing significant disadvantages. This article describes an Extension-led pilot project in Oklahoma centered on addressing this issue through the establishment of a hotspot lending program in four rural libraries. Through the program,…
Descriptors: Program Development, Rural Areas, Public Libraries, Library Services
Midi, Daniele – ProQuest LLC, 2016
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…
Descriptors: Internet, Computer Security, Game Theory, Resource Allocation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Campbell, Wendy – ProQuest LLC, 2017
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Descriptors: Internet, Information Technology, Information Security, Universities
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  53