NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 766 to 780 of 1,589 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mantiri, Franky – Universal Journal of Educational Research, 2014
This essay explores the use of computer technology and multimedia in students learning. Undoubtedly, the advent of computer technology has changed the way humans learn and do things. Moreover, "Computer has become standard equipment" (Bitter & Pierson, 2002) in everyday life. The ability to process data in a real time has helped…
Descriptors: Technology Uses in Education, Multimedia Materials, Information Technology, Computers
Adamo, Oluwayomi – ProQuest LLC, 2011
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
Descriptors: Coding, Technology, Error Correction, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Dudek, Debra; Johnson, Nicola F. – Children's Literature in Education, 2011
When critics consider young people's practices within cyberspace, the focus is often on negative aspects, namely cyber-bullying, obsessive behaviour, and the lack of a balanced life. Such analyses, however, may miss the agency and empowerment young people experience not only to make decisions but to have some degree of control over their lives…
Descriptors: Novels, Adolescent Literature, Information Technology, Empowerment
Paquet, Katherine G. – ProQuest LLC, 2013
Cloud computing may provide cost benefits for organizations by eliminating the overhead costs of software, hardware, and maintenance (e.g., license renewals, upgrading software, servers and their physical storage space, administration along with funding a large IT department). In addition to the promised savings, the organization may require…
Descriptors: Internet, Computer Software, Computers, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Shannon, Li-Jen; Bennett, Judith – Information Systems Education Journal, 2012
A majority of incoming college freshmen and sophomores have not applied their critical thinking skills as part of their learning process. This paper investigates how students acquire their critical thinking skills while facing the copyright, fair use, and internet security challenges in this contemporary digital society. The findings show that 90…
Descriptors: Critical Thinking, Thinking Skills, Case Studies, Computer Science Education
Mancuso, Vincent Francis – ProQuest LLC, 2012
In the modern workplace, collaboration is no longer only a face-to-face process. When working together, it is common for teams to rely on technology and operate across geographic, temporal and cultural boundaries. Most research, when looking at distributed teams, takes a uni-disciplinary perspective and fails to address the entire problem space.…
Descriptors: Interdisciplinary Approach, Teamwork, Cooperation, Group Dynamics
Alvarez Xochihua, Omar – ProQuest LLC, 2012
Intelligent Tutoring Systems (ITS) have a significant educational impact on student's learning. However, researchers report time intensive interaction is needed between ITS developers and domain-experts to gather and represent domain knowledge. The challenge is augmented when the target domain is ill-defined. The primary problem resides in…
Descriptors: Intelligent Tutoring Systems, Knowledge Level, Demonstrations (Educational), Knowledge Representation
Peer reviewed Peer reviewed
Direct linkDirect link
McMullan, John L.; Kervin, Melissa – International Journal of Mental Health and Addiction, 2012
This study examines the web design and engineering, advertising and marketing, and pedagogical features present at a random sample of 71 international poker sites obtained from the Casino City directory in the summer of 2009. We coded for 22 variables related to access, appeal, player protection, customer services, on-site security, use of images,…
Descriptors: Addictive Behavior, Familiarity, Advertising, Internet
Wang, Wei – ProQuest LLC, 2010
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Descriptors: Computer Networks, Computer Security, Graphs, Evaluation Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers
Peer reviewed Peer reviewed
Direct linkDirect link
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Clark, Kenneth Norman – ProQuest LLC, 2012
A "commons" is the conventional term that describes a widely accessible and shared resource, such as an ocean, open rangeland, a public park, or public portions of the Internet, which is difficult to exclude or limit use once naturally provided or humanly produced. Ruin of a commons can result when individuals use the resource recklessly…
Descriptors: Mixed Methods Research, Internet, Governance, Federal Government
Pages: 1  |  ...  |  48  |  49  |  50  |  51  |  52  |  53  |  54  |  55  |  56  |  ...  |  106