NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 376 to 390 of 4,568 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Asiyai, Romina Ifeoma – International Education Studies, 2014
Employing survey research design of the ex-post facto type, this study examined information and community technologies integration in teaching and learning in institutions of higher learning in Delta State, Nigeria. Four research questions and four hypotheses guided the investigation. Descriptive statistical tools such as mean and standard…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Higher Education
Paul, Utpal Kumar – ProQuest LLC, 2012
Since the days Internet traffic proliferated, measurement, monitoring and analysis of network traffic have been critical to not only the basic understanding of large networks, but also to seek improvements in resource management, traffic engineering and security. At the current times traffic in wireless local and wide area networks are facing…
Descriptors: Computer Networks, Telecommunications, Information Networks, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Berry, Barnett; Byrd, Ann – Yearbook of the National Society for the Study of Education, 2012
In this chapter, the authors draw on their experiences with working in building virtual communities of teachers and a pilot program to examine the prospects for increasing consistency in the effectiveness of new teacher support through online networks. Although not intended as a substitute for high-quality face-to-face mentoring experiences,…
Descriptors: Pilot Projects, Mentors, Beginning Teachers, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Salamanca, Juan – ProQuest LLC, 2012
With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…
Descriptors: Social Theories, Social Networks, Computer Networks, Man Machine Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2012
This article features a major statewide initiative in North Carolina that is showing how a consortium model can minimize risks for districts and help them exploit the advantages of cloud computing. Edgecombe County Public Schools in Tarboro, North Carolina, intends to exploit a major cloud initiative being refined in the state and involving every…
Descriptors: Consortia, Elementary Secondary Education, Needs Assessment, Online Vendors
Peer reviewed Peer reviewed
Direct linkDirect link
Misra, P. K. – Educational Media International, 2012
The changing landscape of learning is helping Asian countries to emerge as technology-driven knowledge-based societies. The success of these societies depends on promoting the acquisition of key competences and broadening opportunities for innovative and more flexible forms of learning for every citizen. Considering that in Asia almost everyone…
Descriptors: Lifelong Learning, Foreign Countries, Internet, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Jieun; Ryu, Hokyoung; Katuk, Norliza; Wang, Ruili; Choi, Gyunghyun – Journal of Educational Computing Research, 2014
The present study aims to show if a skill-challenge balancing (SCB) instruction strategy can assist learners to motivationally engage in computer-based learning. Csikszentmihalyi's flow theory (self-control, curiosity, focus of attention, and intrinsic interest) was applied to an account of the optimal learning experience in SCB-based learning…
Descriptors: Teaching Methods, Student Motivation, Learner Engagement, Computer Assisted Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ozan, Ozlem – Turkish Online Journal of Distance Education, 2013
Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: (1) to learn in a networked environment; (2) to manage their…
Descriptors: Foreign Countries, Social Networks, Distance Education, Educational Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Chawinga, Winner Dominic – E-Learning and Digital Media, 2016
It is understood that microblogging (tweeting) which is a form of Web 2.0, has been a centre of attraction in some institutions of higher education. However, despite its hype and pomp as reported by some scholars in developed countries, integration of Twitter in a classroom environment in developing countries is just beginning to flourish. In…
Descriptors: Social Media, Electronic Publishing, Course Content, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wen-Chen; Chen, Ching-Wen; Weng, Richard – International Journal of Distance Education Technologies, 2015
In the conventional classroom, many obstacles hinder interaction between an instructor and students, such as limited class hours, fixed seating, and inadequate time for meetings after class. This work develops a novel multimedia mobile classroom feedback system (MMCFS) that instantly displays students' responses, such as class-related questions or…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Interaction
Gao, Niu – Public Policy Institute of California, 2015
In addition to the Common Core State Standards (CCSS), California is implementing a new, online assessment system: the California Assessment of Student Performance and Progress (CAASPP). Field tests were conducted last spring and the system is being rolled out this year, amid concerns about whether schools are technologically prepared. Using…
Descriptors: Online Courses, Educational Technology, Computer Assisted Testing, Technology Uses in Education
Cuthrell, Michael Gerard – ProQuest LLC, 2011
Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…
Descriptors: Information Technology, Information Systems, Telecommunications, Expertise
Peer reviewed Peer reviewed
Direct linkDirect link
Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie – Learning and Instruction, 2011
The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…
Descriptors: Voting, Debate, Classroom Environment, Computer Networks
Pages: 1  |  ...  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  ...  |  305