NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)4
Since 2006 (last 20 years)27
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 43 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Office of Educational Technology, US Department of Education, 2020
Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and weaknesses. Today's digital tools and resources support and enhance learning at home and in the…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Office of Educational Technology, US Department of Education, 2020
This guide is the Spanish version of the "Parent and Family Digital Learning Guide". Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
PACER Center, 2013
If the word "bullying" makes you think of one child picking on another in the schoolyard, it is time to update your image of how students bully. While the face-to-face harassment certainly still exists, new ways of bullying have emerged. With the easy access to cell phones, instant messaging, mobile devices, social networking websites,…
Descriptors: Bullying, Computer Mediated Communication, Telecommunications, Internet
Fox, Christine; Cougan, Monica; Little, Rachel – State Educational Technology Directors Association, 2017
Providing access to robust connectivity is critical to ensuring today's students are college and career ready. As such, federal, state, and district-level leaders have dedicated a significant amount of time, effort, and resources toward improving our schools' external broadband access, including both Internet access and wide area network (WAN).…
Descriptors: Internet, Computer Networks, Educational Planning, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Manzo, Kathleen Kennedy – Education Week, 2010
In its role helping the nation's schools connect to the Internet and other telecommunications services, the "E-rate" has been among the most consistent of federal programs. Funding for the "education rate" program has held at about $2.25 billion a year since it was created under the Telecommunications Act of 1996, and it covers…
Descriptors: Telecommunications, Educational Technology, Internet, Federal Legislation
Mohanna, Mahmoud; Capus, Laurence – International Association for Development of the Information Society, 2013
This paper presents a mobile learning application for a learning course at higher education level. Based on the RSS feed technology, the presented mobile application establishes an in-time communication channel between the instructor and his/her students to keep them up-to-date with all course important dates, instructions and information in…
Descriptors: Technology Uses in Education, Educational Technology, Electronic Learning, Telecommunications
Young, Jeffrey R. – Education Digest: Essential Readings Condensed for Quick Review, 2009
In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…
Descriptors: Computer Security, Computers, Social Networks, Evaluation Methods
Villano, Matt – Campus Technology, 2009
Academic technologists at Lynn University (Florida) learned the hard way just how important a disaster recovery plan can be. Back in 2005, when Hurricane Wilma walloped the region with driving rain and 120 mile-per-hour winds, the storm debilitated Lynn's IT department, causing damage and flooding that thwarted the campus network for nearly two…
Descriptors: Emergency Programs, Educational Technology, Information Technology, Internet
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Peer reviewed Peer reviewed
Direct linkDirect link
McSwain-Starrett, Lauren T.; Conley, Stephanie Scheer – EDUCAUSE Quarterly, 2011
Student computing is now mobile. For college students across the nation, convenient access to information--anytime, anywhere, on demand--has become not only a priority, but a necessity. To successfully serve the needs of this current generation of students, colleges and universities must recognize the trend and align services accordingly.…
Descriptors: College Students, Access to Information, Handheld Devices, Computer Software
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie – EDUCAUSE Quarterly, 2008
Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…
Descriptors: Small Colleges, Educational Technology, Information Technology, School Policy
Previous Page | Next Page »
Pages: 1  |  2  |  3