Publication Date
In 2025 | 1 |
Since 2024 | 12 |
Since 2021 (last 5 years) | 16 |
Since 2016 (last 10 years) | 42 |
Since 2006 (last 20 years) | 188 |
Descriptor
Source
Author
Publication Type
Education Level
Higher Education | 88 |
Postsecondary Education | 43 |
Elementary Secondary Education | 22 |
Elementary Education | 9 |
Secondary Education | 9 |
High Schools | 6 |
Middle Schools | 4 |
Adult Education | 3 |
Grade 4 | 3 |
Grade 2 | 2 |
Grade 5 | 2 |
More ▼ |
Audience
Practitioners | 83 |
Teachers | 35 |
Policymakers | 33 |
Administrators | 26 |
Students | 12 |
Media Staff | 11 |
Researchers | 10 |
Parents | 3 |
Community | 2 |
Location
United States | 32 |
Canada | 29 |
California | 14 |
United Kingdom | 13 |
Japan | 12 |
Australia | 11 |
New York | 10 |
North Carolina | 10 |
North Dakota | 9 |
Texas | 9 |
Finland | 8 |
More ▼ |
Laws, Policies, & Programs
First Amendment | 3 |
Goals 2000 | 3 |
Telecommunications Act 1996 | 3 |
Equal Access | 2 |
Americans with Disabilities… | 1 |
Library Services and… | 1 |
Assessments and Surveys
Peabody Individual… | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Elmekki, Ouchker; Maizate, Abderrahim; Ouzzif, Mohammed – International Journal of Web-Based Learning and Teaching Technologies, 2021
Wireless sensor networks (WSN) are an ad hoc network consisting of miniaturized autonomous sensors that communicate with each other over a radio link. In this paper, the authors' contribution is a cross-layer approach. To achieve this approach, the authors proposed in the first part an improvement of LEACH algorithm named WEIGHTED_LEACH. This…
Descriptors: Computer Networks, Telecommunications, Mathematics, Energy Conservation
Kathy D. Lohr – New Directions for Adult and Continuing Education, 2025
Having access to the Internet and acquiring the skills necessary to use, question, and create in a digital environment have become essential to living and working in the 21st century. Yet, this move to digitalization has created a digital divide between those who have broadband "access" and the "skills and attitudes" to…
Descriptors: Digital Literacy, Access to Internet, Equal Education, Global Approach
XiFeng Liao – International Journal of Information and Communication Technology Education, 2024
A modern technology-supported vocational educational system significantly affects the quality of vocational training and contributes to the innovation and economic development of the regional area. The visualization literature analysis was adopted with the purpose of exploring the theoretical framework for developing a 6G-assisted network to…
Descriptors: Computer Networks, Information Networks, Technology Integration, Regional Cooperation
Jorge J. Mendieta – ProQuest LLC, 2021
This qualitative descriptive study explored how full-time faculty of a California higher education institution described their experience with the Information Technology Services employees' commitment, communications, and quality of customer service when resolving classroom Wi-Fi issues. The study used the model of Total Quality Management (TQM)…
Descriptors: Information Technology, Higher Education, Technical Support, Teacher Attitudes
Duanyang Zhao – International Journal of Information and Communication Technology Education, 2024
The global demand for wireless communication networks is a result of the widespread use of wireless devices and the related surge of wireless service providers. Data transmission speed, coverage areas, cost-effectiveness, resource utilization, security, scalability, and adaptability are all elements expected to be improved in future 5G wireless…
Descriptors: Foreign Countries, Electronic Learning, English (Second Language), Second Language Learning
Richard Kyere Asomah; Douglas Darko Agyei; Gabriel Assamah; Kwaku Darko Amponsah – Cogent Education, 2024
The study discusses the impact of a nationwide deployment of Wi-Fi technology in some Senior High Technical Vocational Schools (SHTVs) in Ghana, using the first four levels of Guskey's framework. A stratified sampling approach was used to select 119 teachers as participants in the study. An embedded mixed method research design was employed to…
Descriptors: Foreign Countries, High Schools, Vocational Education, High School Teachers
Livia Tomás; Ophélie Bidet – International Journal of Social Research Methodology, 2024
Qualitative research has been strongly affected by the COVID-19 pandemic, highlighting the possibilities that Voice over Internet Protocol (VoIP) technologies such as Skype, WhatsApp, and Zoom offer to qualitative scholars. Based on the experience of using such technologies to collect qualitative data for our PhD studies, we present how we dealt…
Descriptors: Telecommunications, Qualitative Research, Interviews, Interpersonal Relationship
Reisdorf, Bianca C.; Yankelevich, Aleksandr; Shapiro, Mitch; Dutton, William H. – Education and Information Technologies, 2019
As many as three million households with school-aged children in the United States do not have any Internet service at home, and 18% do not have a broadband connection, creating a "homework gap" between those who can access the Internet to support their schoolwork at home, and those who cannot. Based on a series of empirical case studies…
Descriptors: Access to Computers, Disadvantaged, Internet, Homework
Meng Qu – Education and Information Technologies, 2024
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze visitor patterns in academic libraries. The PCA system offers real-time crowding information to the public and a comprehensive visitor analysis dashboard for library administrators. The system's…
Descriptors: Academic Libraries, Users (Information), Use Studies, Space Utilization
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Tungela, Nomawethu; Iyamu, Tiko – Education and Information Technologies, 2019
The South African government strives to increase citizens' participation in economic, political, social and trade activities through online connectivity, by providing free Wi-Fi for previously disadvantage, peri-urban communities. This was in an attempt to contribute and promote poverty alleviation, growth and economic transformation among…
Descriptors: Foreign Countries, Telecommunications, Computer Networks, Educational Technology
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Hui Meng; Li Ma; Lei Su; Bei Lu; Di Hou; Xiaowei Du – International Journal of Web-Based Learning and Teaching Technologies, 2024
Intangible cultural heritage is an important part of Chinese excellent traditional culture, and college dance teaching is paid more attention by researchers of physical education and computer technology. In order to help the inheritance and development of non-legacy culture in college dance teaching, this paper analyzes the influencing factors of…
Descriptors: Dance Education, Cultural Background, Telecommunications, Computer Networks