NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 346 to 360 of 4,568 results Save | Export
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Ravage, Barbara – Campus Technology, 2012
For better or worse, college sports are a big, big deal. But the value of sports on campus goes far beyond gate receipts, sponsorships, and TV revenues. Regardless of the size of a school, sports are a key element in spurring alumni giving and involvement; they play a major factor in helping prospective students select a college; and they help…
Descriptors: Educational Technology, College Athletics, Computer Uses in Education, Costs
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tuters, Stephanie; Read, Robyn; Harris, Shasta Carr; Anwar, Arif; Levin, Ben – Canadian Journal of Educational Administration and Policy, 2012
This paper outlines the process by which the Ontario Education Research Exchange (OERE), part of the Knowledge Network of Applied Education Research, developed and launched an online hub of education research summaries to facilitate greater use of research by stakeholders in the field of education. The project is an effort in knowledge…
Descriptors: Stakeholders, Foreign Countries, Peer Evaluation, Educational Research
Peer reviewed Peer reviewed
Direct linkDirect link
Uysal, Murat Pasa – Interactive Learning Environments, 2016
Various methods and tools have been proposed to overcome the learning obstacles for Object-Oriented Programming (OOP). However, it remains difficult especially for novice learners. The problem may be not only adopting an instructional method, but also an Integrated Development Environment (IDE). Learners employ IDEs as a means to solve programming…
Descriptors: Evaluation, Educational Environment, Cognitive Processes, Difficulty Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hwang, Wu-Yuin; Kongcharoen, Chaknarin; Ghinea, Gheorghita – International Review of Research in Open and Distance Learning, 2014
Recently, various computer networking courses have included additional laboratory classes in order to enhance students' learning achievement. However, these classes need to establish a suitable laboratory where each student can connect network devices to configure and test functions within different network topologies. In this case, the Linux…
Descriptors: Cooperative Learning, Synchronous Communication, Computer Mediated Communication, Virtual Classrooms
Peer reviewed Peer reviewed
Direct linkDirect link
Sarkar, Nurul I. – International Journal of Web-Based Learning and Teaching Technologies, 2013
Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It…
Descriptors: Telecommunications, Computer Networks, Undergraduate Students, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Rabkin, Ariel; Reiss, Charles; Katz, Randy; Patterson, David – ACM Transactions on Computing Education, 2013
We describe our experiences teaching MapReduce in a large undergraduate lecture course using public cloud services and the standard Hadoop API. Using the standard API, students directly experienced the quality of industrial big-data tools. Using the cloud, every student could carry out scalability benchmarking assignments on realistic hardware,…
Descriptors: Assignments, Undergraduate Study, Computer Networks, Educational Technology
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Giordano, Eugenio – ProQuest LLC, 2011
Many of the devices we interact with on a daily basis are currently equipped with wireless connectivity. Soon this will be extended to the vehicles we drive/ride every day. Wirelessly connected vehicles will form a new kind of network that will enable a wide set of innovative applications ranging from enhanced safety to entertainment. To…
Descriptors: Telecommunications, Computer Networks, Motor Vehicles, Mobility
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Wang, Wei – ProQuest LLC, 2010
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Descriptors: Computer Networks, Computer Security, Graphs, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Pazdrowski, Tomasz – ProQuest LLC, 2013
Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…
Descriptors: Innovation, Resistance to Change, Internet, Adoption (Ideas)
Pages: 1  |  ...  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  ...  |  305