NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 46 to 60 of 4,568 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
James P. Takona – Critical Questions in Education, 2025
This study analyzes Savage Inequalities: Children in America's Schools by Jonathan Kozol, a foundational text that reveals persistent inequalities in the US education system. Equity theory acts as a conceptual basis for this review, which builds on Kozol's arguments by examining the connections between race, socioeconomic status, and policy. The…
Descriptors: Educational Practices, Equal Education, Resource Allocation, Educational Equity (Finance)
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Peer reviewed Peer reviewed
Direct linkDirect link
Muthukumar, N.; Srinivasan, Seshadhri; Subathra, B.; Ramkumar, K. – IEEE Transactions on Education, 2021
Contribution: This article explores how the Industrial Internet of Things (IIoT) could be leveraged to enhance the teaching/learning experience of advanced control techniques [e.g., model-predictive control (MPC)] for complex systems (nonlinear and multivariable) for undergraduate students. Background: The IIoTs' features, such as ubiquitous…
Descriptors: Undergraduate Students, College Science, Science Instruction, Internet
Chris Sanders – ProQuest LLC, 2021
Despite significant investment in cyber security, the industry is unable to stem the tide of damaging attacks against computer networks. This unfortunate situation is, in part, because cyber security exists in a state of cognitive crisis defined by tacit knowledge and poorly understood processes. At the heart of the crisis are digital forensic…
Descriptors: Cognitive Ability, Thinking Skills, Crime, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Douglas R. Bowie – ProQuest LLC, 2023
This mixed methods research study explores the university student learning experience of IP subnetting. Using a constructivist perspective, VR software was designed, written, and utilized in a learning process to gather both quantitative and qualitative data about the experience of learning IP subnetting. Participants underwent pre-test and…
Descriptors: Simulated Environment, Computer Simulation, Student Experience, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Teresa Swist; Thilakshi Mallawa Arachchi; Jenna Condie; Benjamin Hanckel – Learning, Media and Technology, 2024
The COVID-19 pandemic sparked an unprecedented expansion of educational technologies and digitisation of the university sector, and also amplified existing inequalities and crises. In this paper, we introduce the 'socio-technically just pedagogies framework' to systemically explore curriculum-making, student-staff partnerships, knowledge…
Descriptors: Foreign Countries, College Students, College Faculty, Teacher Student Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Livia Tomás; Ophélie Bidet – International Journal of Social Research Methodology, 2024
Qualitative research has been strongly affected by the COVID-19 pandemic, highlighting the possibilities that Voice over Internet Protocol (VoIP) technologies such as Skype, WhatsApp, and Zoom offer to qualitative scholars. Based on the experience of using such technologies to collect qualitative data for our PhD studies, we present how we dealt…
Descriptors: Telecommunications, Qualitative Research, Interviews, Interpersonal Relationship
Hari Prasad Challa – ProQuest LLC, 2024
The increasing complexity of modern power systems, coupled with the integration of diverse rapidly evolving technologies involving physical systems requiring cybersecurity, has presented significant challenges for engineers in the field and researchers in laboratory facilities. This research and dissertation presents the development of a…
Descriptors: Computer Security, Information Systems, Technology Integration, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Barlowe, Scott – IEEE Transactions on Education, 2021
Contribution: This article demonstrates that social, cultural, economic, and political topics can be effectively addressed in the context of traditional computer science and engineering topics with few additional resources and little coordination. Background: Social, cultural, economic, and political influences are often secondary topics in…
Descriptors: Global Approach, Computer Science Education, Computer Networks, Social Influences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Peer reviewed Peer reviewed
Direct linkDirect link
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Love Börjeson; Chris Haffenden; Martin Malmsten; Fredrik Klingwall; Emma Rende; Robin Kurtz; Faton Rekathati; Hillevi Hägglöf; Justyna Sikora – College & Research Libraries, 2024
This article provides an account of the making of KBLab, the data lab at the National Library of Sweden (KB). The first part discusses the work involved in establishing a lab as both a physical and a digital site for researchers to use digital collections at previously unimaginable scales. The second part explains how the lab has deployed the…
Descriptors: Foreign Countries, Government Libraries, Artificial Intelligence, Computer Networks
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  305