Publication Date
| In 2026 | 0 |
| Since 2025 | 14 |
| Since 2022 (last 5 years) | 93 |
| Since 2017 (last 10 years) | 213 |
| Since 2007 (last 20 years) | 750 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Hodgman, Matthew R. – Contemporary Issues in Education Research, 2013
As educational technology continues to rapidly become a vital part of a school district's infrastructure, desktop virtualization promises to provide cost-effective and education-enhancing solutions to school-based computer technology problems in school systems locally and abroad. This article outlines the history of and basic concepts behind…
Descriptors: Educational Technology, Barriers, Computer Software, Computer Networks
Liu, Meredith – Clayton Christensen Institute for Disruptive Innovation, 2014
To illuminate the possibilities for next-generation assessments in K-12 schools, this case study profiles the Cisco Networking Academy, which creates comprehensive online training curriculum to teach networking skills. Since 1997, the Cisco Networking Academy has served more than five million high school and college students and now delivers…
Descriptors: Educational Assessment, Computer Networks, Information Technology, Elementary Secondary Education
Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C. – IEEE Transactions on Education, 2016
This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…
Descriptors: Teaching Methods, Information Security, Information Networks, Computer Networks
Kokoç, Mehmet; Altun, Arif – International Association for Development of the Information Society, 2016
It is still under debate whether learners' interaction data within e-learning and/or open learning environments could be considered as reflections of their learning experiences to be effective or not. Therefore, it is meaningful to explore the nature of these interactions and to make meaningful conclusions. This study aims to explore what the…
Descriptors: Learning Experience, Interaction, Electronic Learning, Online Courses
Nedyalkova, Anna; Bakardjieva, Teodora; Nedyalkov, Krasimir – International Association for Development of the Information Society, 2016
This paper suggests digital approaches in university management. Digital transformation requires leadership that can maintain and balance competing interests from faculty, administrators, students and others. The team of Varna Free University designed a flexible proper solution VFU SMART STUDENT aiming at lower operating costs and better…
Descriptors: Information Security, Information Systems, Computer Networks, Guidelines
Galanek, Joseph D.; Gierdowski, Dana C.; Brooks, D. Christopher – EDUCAUSE, 2018
For 15 years, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology (IT) and higher education's most important end users, undergraduate students. This year's report includes inclusion of the perspectives of students with learning and physical disabilities on how their institutions respond to their…
Descriptors: Undergraduate Students, Information Technology, Computer Uses in Education, Access to Computers
Osaheni Oni; Kelly Odaro-Ekhaguebo; Emmanuel Akpoduado – Journal of Pedagogical Research, 2018
This study assessed Information and Communication Technology (ICT) Proficiency of Secondary School Teachers in Auchi Polytechnic Staff School. The study employed a descriptive surveyed design and purposive sampling techniques to select fifty-three (53) respondents for the study. A structured questionnaire was used to collect data. The data…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Technology, Teacher Evaluation
Office of Educational Technology, US Department of Education, 2017
This guide provides practical, actionable information intended to help both technical personnel and educational leaders navigate the many decisions required to deliver broadband connectivity to students. It presents a variety of options for school and district leaders to consider when making technology infrastructure decisions, recognizing that…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, School Districts
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Abdel-Maksoud, Nahed F. – International Journal of Education and Practice, 2018
Virtualization technology has been around for many years, and its use is increasingly becoming common in education, in general and in computing fields, in particular. This can be attributed partly to its potential to reduce costs, boost efficiency and overcome limited resources through its virtual applications such as servers, storage devices and…
Descriptors: Electronic Learning, Educational Environment, Educational Quality, Instructional Effectiveness
Omidi Najafabadi, Maryam; Mirdamadi, Seyed Mehdi; Payandeh Najafabadi, Amir Teimour – International Journal on E-Learning, 2014
The facts that the wireless technologies (1) are more convenient; and (2) need less skill than desktop computers, play a crucial role to decrease digital gap in rural areas. This study employed the Bayesian Confirmatory Factor Analysis (CFA) to design a mobile training system in rural areas of Iran. It categorized challenges, potential, and…
Descriptors: Foreign Countries, Electronic Learning, Telecommunications, Computer Networks
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Unintended Consequences: New Materialist Perspectives on Library Technologies and the Digital Record
Manoff, Marlene – portal: Libraries and the Academy, 2013
Digital technology has irrevocably altered the nature of the archive. Drawing on materialist critiques and the evolving field of media archaeology, this essay explores new strategies for understanding the implications of computer networks in libraries. Although a significant portion of the contemporary literature within Library and Information…
Descriptors: Computer Networks, Libraries, Information Technology, Archives
Le, Meixing – ProQuest LLC, 2013
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Descriptors: Data, Access to Information, Computer Networks, Internet

Peer reviewed
Direct link
