NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 181 to 195 of 4,561 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bathon, Justin; van Rooyan, Jean W.; Jobert, Rika – Research in Educational Administration & Leadership, 2018
This article presents a review of the development of platform network models that rely on partnership contracts to implement comprehensive school reform. The literature from the previous three decades of development of school networks, emerging largely from the United States of America, is reviewed. The recent development of similar network models…
Descriptors: Educational Change, Partnerships in Education, Contracts, Program Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Edwards, Darla – Learning Professional, 2019
A networked improvement community can be a tremendous resource for people who share a common interest and desire to learn from each other, and, thanks to technology, this can occur even when participants are separated by a large distance. This article discusses Virginia Advanced Study Strategies' Rural Math Innovation Network, a four-year project…
Descriptors: Networks, Rural Schools, Middle Schools, High Schools
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tomczyk, Lukasz; Szyszka, Michal; Stošic, Lazar – Education Sciences, 2020
Problematic Internet Use (PIU) has of late come to the major attention of researchers of risky behaviours. For parents and teachers in turn, the various pathological forms of Internet use have become more and more noticeable. In recent years, the operationalisation of the term PIU has also been discussed and attempts to measure its various…
Descriptors: Internet, Risk, Behavior Problems, Pathology
Peer reviewed Peer reviewed
Direct linkDirect link
MacLeod, Jason; Yang, Harrison Hao; Zhu, Sha; Shi, Yinghui – Journal of Educational Computing Research, 2018
In an effort to address student engagement challenges, much research has explored student-to-student connected classroom climate (CCC). Research positively associates CCC to the benefits of student integration, learning, and retention in face-to-face environments. However, few studies have examined CCC in computer-mediated environments. This study…
Descriptors: Classroom Environment, Computer Networks, Computer Software, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Alghamdi, Naif; den Heijer, Alexandra; de Jonge, Hans – International Journal of Sustainability in Higher Education, 2017
Purpose: The purpose of this paper is to analyse 12 assessment tools of sustainability in universities and develop the structure and the contents of these tools to be more intelligible. The configuration of the tools reviewed highlight indicators that clearly communicate only the essential information. This paper explores how the theoretical…
Descriptors: Universities, Sustainability, Institutional Evaluation, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Kamal, Ahmed Tashrif – ProQuest LLC, 2013
Due to their high fault-tolerance, ease of installation and scalability to large networks, distributed algorithms have recently gained immense popularity in the sensor networks community, especially in computer vision. Multi-target tracking in a camera network is one of the fundamental problems in this domain. Distributed estimation algorithms…
Descriptors: Computer Networks, Mathematics, Computation, Information Transfer
Dogan, Gulustan – ProQuest LLC, 2013
Trust can be an important component of wireless sensor networks for believability of the produced data and historical value is a crucial asset in deciding trust of the data. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. Provenance can…
Descriptors: Computer Networks, Telecommunications, Credibility, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pytlarz, Ian; Pu, Shi; Patel, Monal; Prabhu, Rajini – International Educational Data Mining Society, 2018
Identifying at-risk students at an early stage is a challenging task for colleges and universities. In this paper, we use students' oncampus network traffic volume to construct several useful features in predicting their first semester GPA. In particular, we build proxies for their attendance, class engagement, and out-of-class study hours based…
Descriptors: College Freshmen, Grade Point Average, At Risk Students, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Hashim, Ayesha K. – Journal of Education Finance, 2022
Internet connectivity has become a critical resource for teaching and learning. The Common Core State Standards (CCSS) is a prime example, with schools expected to implement online assessments and use online resources for instruction. Yet there is little known about the extent to which local education agencies (LEAs) and schools are taking…
Descriptors: Common Core State Standards, Computer Assisted Testing, Longitudinal Studies, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Laukens, Kris; Eyckmans, Marleen; De Neuter, Nicolas; Naulaerts, Stefan; Meysman, Pieter; Van Ostade, Xaveer – Journal of Biological Education, 2021
While computational biology and bioinformatics became an inherent part of most life science degrees, it remains challenging to encourage students to employ these diverse skills in a practical research context. In this education paper, we present a method to enable students to acquire hands-on skills by the data-driven study of complex biomolecular…
Descriptors: Data Analysis, Communicable Diseases, Molecular Biology, Science Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Mikroyannidis, Alexander; Gómez-Goiri, Aitor; Smith, Andrew; Domingue, John – Interactive Learning Environments, 2020
The main challenges commonly associated with acquiring practical network engineering skills are the requirements for access to specialised and up-to-date network equipment, as well as the high costs associated with obtaining and maintaining this equipment. The PT Anywhere initiative addresses these challenges by offering a mobile environment for…
Descriptors: Computer Science Education, Computer Networks, Data Analysis, Engineering
Ray, Loye Lynn – ProQuest LLC, 2014
The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…
Descriptors: Computer Networks, Computer Security, Safety, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Pages: 1  |  ...  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  ...  |  305