NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 121 to 135 of 4,568 results Save | Export
DeSerranno, Allen Ronald – ProQuest LLC, 2017
Internet of Things ("IoT") systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within…
Descriptors: Computer Software, Internet, Computer Networks, Engineering
Forrest J. Bowlick; Karen K. Kemp; Shana Crosson; Eric Shook – Geography Teacher, 2024
Cyberinfrastructure (CI) empowers the foundational computation resources underlying data analytics, spatial modeling, and many other domains serving the growing knowledge economy in the United States. In every part of these interactions with CI, questions of how to seamlessly integrate CI training into educational programs exist. In this article,…
Descriptors: Knowledge Economy, Global Approach, World Problems, Multiple Literacies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Rodriguez, Michael; Tonyan, Joel; Wilson, Robert T. – Journal of Electronic Resources Librarianship, 2018
For electronic resources and reference librarians, fielding eresource access problems is often a daily task. A library user clicks on a link to an electronic journal article, book, or primary source and is unable to access the full text. Sometimes this problem occurs due to a lapsed subscription, a broken link, or a proxy configuration error. The…
Descriptors: Troubleshooting, Electronic Libraries, Access to Information, Handheld Devices
Alexander, Charles – ProQuest LLC, 2018
Encryption based ransomware operates by iterating through all files with specific extensions on the computer and mutating them into an unusable form. The mutation, in many cases, can only be reversed if the user pays the operator of the ransomware a fee to get their files back. K-12 school districts have fallen victim to rampant malware as a…
Descriptors: Computer Security, School Districts, Elementary Secondary Education, Computer Uses in Education
G. Sada Kane, Alline Susana – ProQuest LLC, 2018
Educational technology organizations have developed ambassadorship programs and are actively seeking social media influencers to participate in ambassador program activities voluntarily, with no pay. The purpose of this quantitative study was to describe the perceived motivational needs of educators who apply and voluntarily participate in unpaid…
Descriptors: Teacher Motivation, Achievement Need, Educational Technology, Gender Differences
Sletten, Michael Alton – ProQuest LLC, 2020
Mobile devices are rapidly becoming a very popular and convenient means of delivering and consuming learning content worldwide. The rise in popularity is due in part to the technological advancements that mobile devices have made in recent years, along with developments in the online learning platforms and spaces that support mobile learning.…
Descriptors: Educational Technology, Technology Uses in Education, Handheld Devices, Telecommunications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nisar Ahmad; Arif Alam; Ikram Shah – Knowledge Management & E-Learning, 2024
Information Communication Technology (ICT) is ubiquitous in the 21st century, hence both educators and learners need to integrate relevant ICT resources in their teaching and learning practices, to meet stakeholder's expectations and keep abreast with the race of technological advancement. The current research focuses on the analysis of ICT…
Descriptors: Foreign Countries, Information Technology, Communications, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pham, Quoc Trung; Tran, Thanh Phong – Knowledge Management & E-Learning, 2020
e-Learning systems nowadays become vital for many universities in developing countries. They are useful for increasing educational quality and providing students with high-quality learning resources. However, how to attract students to use e-learning systems and how to improve their learning outcomes through e-learning are still difficult…
Descriptors: Foreign Countries, Electronic Learning, Outcomes of Education, Computer Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
White, Tobin – International Journal of Computer-Supported Collaborative Learning, 2018
Classroom activity traditionally takes one of three forms, variously oriented toward the levels of individual students, small groups, or the whole class. CSCL systems, however, may enable novel ways to facilitate instruction within or sequence activity across these different levels. Drawing on theoretical accounts of learning at and across…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Class Activities, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Whitacre, Brian – Journal of Extension, 2019
In today's society, individuals and households without reliable Internet connections are increasingly at risk of facing significant disadvantages. This article describes an Extension-led pilot project in Oklahoma centered on addressing this issue through the establishment of a hotspot lending program in four rural libraries. Through the program,…
Descriptors: Program Development, Rural Areas, Public Libraries, Library Services
Midi, Daniele – ProQuest LLC, 2016
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…
Descriptors: Internet, Computer Security, Game Theory, Resource Allocation
Peer reviewed Peer reviewed
Direct linkDirect link
Recalde, Jordi Mogas; Palau, Ramon; Galés, Neus Lorenzo; Gallon, Ray – International Journal of Mobile and Blended Learning, 2020
This paper presents results of a focus group that gathered data from principals of several public schools in Catalonia regarding the educational impact of Industry 4.0 technologies. Conclusions and recommendations are drawn from qualitative analysis with a view to improving smart classrooms via educational innovation. Results show that the schools…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Public Schools
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Pages: 1  |  ...  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  ...  |  305