NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 361 to 375 of 4,561 results Save | Export
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet
Johnson, R. LeWayne – ProQuest LLC, 2012
Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…
Descriptors: Information Technology, Governance, Federal Government, Information Security
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Lin, C.-P.; Chen, W.; Yang, S.-J.; Xie, W.; Lin, C.-C. – Journal of Computer Assisted Learning, 2014
Improving students' reading comprehension is of significance. In this study, collaborative learning supported by Group Scribbles (GS), a networked technology, was integrated into a primary reading class. Forty-seven 10-year-old students from two 4th grade classes participated in the study. Experimental and control groups were established to…
Descriptors: Elementary School Students, Experimental Groups, Control Groups, Comparative Analysis
Shambare, Narcissus – ProQuest LLC, 2013
The problem examined in the proposed study was the underutilization of the intranet portals (IP) by faculty in institutions of higher education (IHE). Despite the time and investment allocated to the IP, the technology remains underutilized to improve productivity, efficiency, and justify its investment yet there is lack of understanding of why…
Descriptors: Computer Networks, Computer Uses in Education, College Faculty, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Asiyai, Romina Ifeoma – International Education Studies, 2014
Employing survey research design of the ex-post facto type, this study examined information and community technologies integration in teaching and learning in institutions of higher learning in Delta State, Nigeria. Four research questions and four hypotheses guided the investigation. Descriptive statistical tools such as mean and standard…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Higher Education
Paul, Utpal Kumar – ProQuest LLC, 2012
Since the days Internet traffic proliferated, measurement, monitoring and analysis of network traffic have been critical to not only the basic understanding of large networks, but also to seek improvements in resource management, traffic engineering and security. At the current times traffic in wireless local and wide area networks are facing…
Descriptors: Computer Networks, Telecommunications, Information Networks, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Berry, Barnett; Byrd, Ann – Yearbook of the National Society for the Study of Education, 2012
In this chapter, the authors draw on their experiences with working in building virtual communities of teachers and a pilot program to examine the prospects for increasing consistency in the effectiveness of new teacher support through online networks. Although not intended as a substitute for high-quality face-to-face mentoring experiences,…
Descriptors: Pilot Projects, Mentors, Beginning Teachers, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Tran, Dung Trung – ProQuest LLC, 2010
The recent evolution of wireless technology makes wireless devices ever more powerful and intelligent. One trend is that wireless devices are becoming more inexpensive and more diverse. As a result, new technologies make it possible to equip wireless nodes with several radio transmitters/receivers. Each radio may support multiple channels which…
Descriptors: Game Theory, Energy Conservation, Interests, Topology
Du, Ye – ProQuest LLC, 2010
This dissertation examines the economic value of online storage resources that could be traded and shared as potential commodities and the consequential investments and deployment of such resources. The value proposition of emergent business models such as Akamai and Amazon S3 in online storage grids is capacity provision and content delivery at…
Descriptors: Resources, Administration, Information Storage, Risk Management
Yang, Yinying – ProQuest LLC, 2010
Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…
Descriptors: Energy Conservation, Physical Environment, Computer Networks, Telecommunications
Pages: 1  |  ...  |  21  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  ...  |  305