Publication Date
| In 2026 | 8 |
| Since 2025 | 443 |
| Since 2022 (last 5 years) | 2527 |
| Since 2017 (last 10 years) | 5885 |
| Since 2007 (last 20 years) | 13714 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 1276 |
| Teachers | 530 |
| Administrators | 467 |
| Policymakers | 467 |
| Researchers | 334 |
| Media Staff | 322 |
| Students | 118 |
| Community | 54 |
| Parents | 38 |
| Counselors | 27 |
| Support Staff | 15 |
| More ▼ | |
Location
| Australia | 776 |
| Canada | 715 |
| United Kingdom | 662 |
| United States | 593 |
| California | 416 |
| China | 344 |
| United Kingdom (England) | 294 |
| New York | 286 |
| Spain | 240 |
| Germany | 234 |
| Netherlands | 231 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 3 |
| Does not meet standards | 4 |
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Werner, Laurie A.; Frank, Charles E. – Information Systems Education Journal, 2010
Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, we turned to the internet. This paper describes several resources for teaching computer…
Descriptors: Information Security, Information Science Education, Video Technology, Computer Security
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Antic, Eugenia – ProQuest LLC, 2010
Different morphological theories assign different status to parts of words, roots and affixes. Models range from accepting both bound roots and affixes to only assigning unit status to standalone words. Some questions that interest researchers are (1) What are the smallest morphological units, words or word parts? (2) How does frequency affect…
Descriptors: Morphemes, Russian, Morphology (Languages), Language Processing
Haiyue, Jin; Khoon Yoong, Wong – Mathematics Education Research Group of Australasia, 2010
Mathematics educators and mathematics standards of curriculum have emphasised the importance of constructing the interconnectedness among mathematic concepts ("conceptual understanding") instead of only the ability to carry out standard procedures in an isolated fashion. Researchers have attempted to assess the knowledge networks in…
Descriptors: Foreign Countries, Mathematics Education, Concept Mapping, Network Analysis
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Wu, Shuang – ProQuest LLC, 2010
In the first part of this dissertation, we study the competition among network service providers in a parallel-link network with the presence of elastic user demand that diminishes both with higher prices and congestion. First we analyze a game where providers strategically price their service for single class of traffic. Later we analyze a game…
Descriptors: Competition, Models, Incentives, Networks
Brown, Abbie; Green, Tim – Educational Media and Technology Yearbook, 2010
Composed of four sections -- Overall Developments, Corporate Training and Development, Higher Education, and K-12 Education -- this chapter synthesizes the findings of major annual reports including ASTD's "State of the Industry Report," the "EDUCAUSE Core Data Service Fiscal Year 2007 Summary Report," "The ECAR Study of…
Descriptors: Educational Technology, Social Networks, Economic Impact, Electronic Learning
Sekar, J. M. Arul; Rajendran, K. K. – Online Submission, 2010
Network technology provides access to various sources of information from across the world. Network technology allows the higher education system to bring the lab to the classroom, rather than making students move to separate classrooms when they need to use computers. It, therefore, saves cost and makes students more productive. Students and…
Descriptors: Computer Networks, Technology Uses in Education, Higher Education, Internet
Pearson, Jerold – CURRENTS, 2010
Most people are aware of the increasing importance of social media to institutional advancement, and many colleges and universities have started investing resources in these media. The next step is to measure the impact of social media on the institution and evaluate the success of one's efforts. Every advancement leader should understand how…
Descriptors: Institutional Advancement, Schools, Alumni, Social Networks
Zambo, Debby M. – TEACHING Exceptional Children, 2010
For youth with disabilities, it is good to belong to multiple groups and have multiple identities. Social groups are important to people because they are social creatures. Unless a child has a severe social disability, connecting with others is important, especially during adolescence. Adolescence is the time when young people define themselves by…
Descriptors: Disabilities, Adolescents, Social Networks, Identification (Psychology)
Burgess, J. T. F. – Computers in Libraries, 2010
This article proceeds from the position that obsession with technology is a distraction from librarians' true mission and explores how a constellation of emerging information technologies might empower librarians to reconsider their commitment to the technological treadmill and instead turn to a more humanistic orientation. This article presents…
Descriptors: Semantics, Information Technology, Educational Technology, Librarians
Fenwick, Tara J. – Journal of Education Policy, 2010
Recent critiques have drawn important attention to the depoliticized consensus and empty promises embedded in network discourses of educational policy. While acceding this critique, this discussion argues that some forms of network analysis--specifically those adopting actor-network theory (ANT) approaches--actually offer useful theoretical…
Descriptors: Academic Standards, Network Analysis, Educational Policy, Policy Analysis

Peer reviewed
Direct link
