NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 601 to 615 of 4,568 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos – Computers and Education, 2007
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…
Descriptors: Computer Security, Distance Education, Computer Networks, Educational Environment
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Dumitrascu, Eugen; Popa, Marius – Journal of Applied Quantitative Methods, 2007
In this paper, we present the characteristic features of distributed applications. We also enumerate the modalities of optimizing them and the factors that influence the quality of distributed applications, as well as the way they are affected by the optimization processes. Moreover, we enumerate the quality characteristics of distributed…
Descriptors: Computer Oriented Programs, Computer Networks, Improvement, Computer Software
Hegedus, Stephen – Educational Technology, 2007
This article shows how highly mobile computing, when used with new forms of network connectivity, can allow new forms of activities in the mathematics classroom. Examples are provided, such as the ability to share, harvest, and aggregate mathematical objects, and the ability for teachers and students to analyze the entire set of classroom…
Descriptors: Computer Uses in Education, Computer Networks, College Mathematics, Calculus
Azeta, A. A.; Oyelami M. O. – Online Submission, 2008
With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge, rather, an electronic means of learning has continued to evolve. Electronic learning (e-Learning), which facilitates education using communications networks, has made learning…
Descriptors: Computer Uses in Education, Computer Software, Computer Networks, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Dawson, Phillip – Australasian Journal of Educational Technology, 2010
This article presents an argument for the use of networked interactive whiteboards (NIWBs) in regional Australian higher education and identifies new pedagogies for this context. Most Australian universities operate multiple campuses, and many use video conference facilities to deliver courses across these sites. For students at remote video…
Descriptors: Higher Education, Computer Assisted Instruction, Lecture Method, Regional Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Western Interstate Commission for Higher Education, 2009
A forward-thinking National Broadband Strategy should focus on the transformative power of advanced networks to unleash new waves of innovation, jobs, economic growth, and national competitiveness. Such a strategy should create new tools to deliver health care, education, and a low carbon economy. The American Recovery and Reinvestment Act…
Descriptors: Computer Networks, Futures (of Society), Economic Progress, Social Change
Peer reviewed Peer reviewed
Direct linkDirect link
Butler, LeRoy – EDUCAUSE Quarterly, 2009
Lourdes College is a small, private, coeducational commuter college located in northwest Ohio. In early 2009, the Lourdes College Board of Trustees ratified a new strategic plan promoting institutional strength and sustainability over the next six years. The desired outcome was to make Lourdes College a stronger, more vibrant, even more socially…
Descriptors: Strategic Planning, Commuter Colleges, Sustainable Development, Feasibility Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Johnson, L.; Smith, R.; Levine, A.; Haywood, K. – New Media Consortium, 2010
The "Horizon Report" series is the most visible outcome of the New Media Consortium's Horizon Project, an ongoing research effort established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. This volume, the "2010…
Descriptors: Advisory Committees, Elementary Secondary Education, Creative Activities, Global Approach
Federal Communications Commission, 2010
In early 2009, Congress directed the Federal Communications Commission (FCC) to develop a National Broadband Plan to ensure every American has "access to broadband capability." Congress also required that this plan include a detailed strategy for achieving affordability and maximizing use of broadband to advance "consumer welfare, civic…
Descriptors: Telecommunications, Computer Networks, Information Technology, Federal Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Sheehan, Mark C. – EDUCAUSE Review, 2008
Drawn from a recent ECAR research study, this article addresses the importance of five CI technologies to various academic areas in research and in teaching and learning at present and how survey respondents think the importance of these technologies might change in the near future. (Contains 2 figures, 2 tables and 7 notes.)
Descriptors: Computer Networks, Internet, Technological Advancement, Research
Pages: 1  |  ...  |  37  |  38  |  39  |  40  |  41  |  42  |  43  |  44  |  45  |  ...  |  305