Publication Date
In 2025 | 7 |
Since 2024 | 60 |
Since 2021 (last 5 years) | 108 |
Since 2016 (last 10 years) | 231 |
Since 2006 (last 20 years) | 806 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 400 |
Teachers | 174 |
Administrators | 148 |
Policymakers | 90 |
Media Staff | 56 |
Researchers | 54 |
Students | 24 |
Parents | 12 |
Community | 5 |
Counselors | 2 |
Location
Canada | 95 |
United States | 80 |
United Kingdom | 59 |
Australia | 47 |
California | 38 |
Texas | 33 |
Japan | 30 |
New York | 30 |
Florida | 25 |
Pennsylvania | 25 |
Finland | 22 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Does not meet standards | 1 |
Bottum, James R.; Davis, James F.; Siegel, Peter M.; Wheeler, Brad; Oblinger, Diana G. – EDUCAUSE Review, 2008
Cyberinfrastructure permits a new kind of scholarly inquiry and education, empowering communities to innovate and to revolutionize what they do, how they do it, and who participates. (Contains 6 notes.)
Descriptors: Inquiry, Computer Networks, Internet, Technological Advancement
Yousif, Wael K. – ProQuest LLC, 2010
This causal and correlational study was designed to extend the Technology Acceptance Model (TAM) and to test its applicability to Valencia Community College (VCC) Engineering and Technology students as the target user group when investigating the factors influencing their decision to adopt and to utilize VMware as the target technology. In…
Descriptors: Employment Level, Self Efficacy, Academic Achievement, Intention
Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos – Computers and Education, 2007
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…
Descriptors: Computer Security, Distance Education, Computer Networks, Educational Environment
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Dumitrascu, Eugen; Popa, Marius – Journal of Applied Quantitative Methods, 2007
In this paper, we present the characteristic features of distributed applications. We also enumerate the modalities of optimizing them and the factors that influence the quality of distributed applications, as well as the way they are affected by the optimization processes. Moreover, we enumerate the quality characteristics of distributed…
Descriptors: Computer Oriented Programs, Computer Networks, Improvement, Computer Software
Hegedus, Stephen – Educational Technology, 2007
This article shows how highly mobile computing, when used with new forms of network connectivity, can allow new forms of activities in the mathematics classroom. Examples are provided, such as the ability to share, harvest, and aggregate mathematical objects, and the ability for teachers and students to analyze the entire set of classroom…
Descriptors: Computer Uses in Education, Computer Networks, College Mathematics, Calculus
Li, Qing; Zhao, Jianmin; Zhu, Xinzhong – International Journal of Distance Education Technologies, 2009
Supporting efficient data access in the mobile learning environment is becoming a hot research problem in recent years, and the problem becomes tougher when the clients are using light-weight mobile devices such as cell phones whose limited storage space prevents the clients from holding a large cache. A practical solution is to store the cache…
Descriptors: Electronic Learning, Research Problems, Statistical Data, Statistical Inference
Wheeler, Brad; Waggener, Shelton – EDUCAUSE Review, 2009
The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…
Descriptors: Higher Education, Internet, Computer Software, Computers
Cronin, John J. – Journal of Marketing Education, 2009
Wikis are one of the newest features of Web 2.0. This article describes the implementation of a project in a marketing course in which students created an interactive textbook using wiki software. Several surprises encountered along the way are described, and the unique problem of grading individual contributions to a wiki is discussed. The author…
Descriptors: Marketing, Educational Technology, Hypermedia, Cooperative Learning
Larusson, Johann Ari – ProQuest LLC, 2010
Prior research has highlighted the educational benefit of enabling students to participate in collaborative learning activities. Developing technology that extends the physical boundaries of the classroom and enables students to engage in meaningful collaborative learning activities outside class time can be of significant value. For any…
Descriptors: Learning Activities, Educational Benefits, Cooperative Learning, Interaction
Azeta, A. A.; Oyelami M. O. – Online Submission, 2008
With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge, rather, an electronic means of learning has continued to evolve. Electronic learning (e-Learning), which facilitates education using communications networks, has made learning…
Descriptors: Computer Uses in Education, Computer Software, Computer Networks, Computer Mediated Communication
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Crichton, Susan; Pegler, Karen; White, Duncan – Electronic Journal of e-Learning, 2012
Our paper reports findings from a two-phase deployment of iPod Touch and iPad devices in a large, urban Canadian school board. The purpose of the study was to gain an understanding of the infrastructure required to support handheld devices in classrooms; the opportunities and challenges teachers face as they begin to use handheld devices for…
Descriptors: Foreign Countries, Familiarity, High School Students, Teaching Methods
Western Interstate Commission for Higher Education, 2009
A forward-thinking National Broadband Strategy should focus on the transformative power of advanced networks to unleash new waves of innovation, jobs, economic growth, and national competitiveness. Such a strategy should create new tools to deliver health care, education, and a low carbon economy. The American Recovery and Reinvestment Act…
Descriptors: Computer Networks, Futures (of Society), Economic Progress, Social Change