NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 81 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Forrest J. Bowlick; Karen K. Kemp; Shana Crosson; Eric Shook – Geography Teacher, 2024
Cyberinfrastructure (CI) empowers the foundational computation resources underlying data analytics, spatial modeling, and many other domains serving the growing knowledge economy in the United States. In every part of these interactions with CI, questions of how to seamlessly integrate CI training into educational programs exist. In this article,…
Descriptors: Knowledge Economy, Global Approach, World Problems, Multiple Literacies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zabasta, Anatolijs; Peuteman, Joan; Kunicina, Nadezda; Kazymyr, Volodymyr; Hvesenya, Sergey; Hnatov, Andrii; Paliyeva, Tatsiana; Ribickis, Leonids – Education Sciences, 2020
The increasing importance of continuingly complex Cyber-Physical Systems (CPS) challenges and encourages universities worldwide to organize up-to-date CPS oriented educational programs. The Erasmus+ project "CybPhys" aims to support CPS oriented educational programs in Belarus and Ukraine. We put forward a hypothesis that the educational…
Descriptors: Foreign Countries, Geographic Regions, Cultural Differences, Higher Education
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Mihai, Maryke A. – Africa Education Review, 2017
In April 2008, an interactive information communication technology (ICT) network was established in Mpumalanga, South Africa. the network involved the implementation of SMART board interactive whiteboards (IWBs) and collaboration between a leading school and several disadvantaged schools. the main purpose of the Mpumalanga IWB project was to reach…
Descriptors: Rural Schools, Computer Networks, Information Technology, Interviews
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tang, Stephen; Hanneghan, Martin; Carter, Christopher – Electronic Journal of e-Learning, 2013
Game-based learning (GBL) combines pedagogy and interactive entertainment to create a virtual learning environment in an effort to motivate and regain the interest of a new generation of "digital native" learners. However, this approach is impeded by the limited availability of suitable "serious" games and high-level design…
Descriptors: Models, Engineering, Instructional Design, Computer Games
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Dutt, Abhijit – ProQuest LLC, 2013
Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can…
Descriptors: Essays, Economic Factors, Information Technology, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6