Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Hodgson, Vivien; Reynolds, Michael – Studies in Higher Education, 2005
The article reviews the popularity in networked learning designs for values of collaboration, and in particular, of community. Examples of this are drawn from the networked learning literature, highlighting corresponding arguments for networked learning providing the basis for a more democratic ethos within higher educational programmes. The…
Descriptors: Computer Mediated Communication, Learning Processes, Computer Networks, Higher Education
Svetcov, Eric – Technology & Learning, 2005
This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…
Descriptors: Costs, Computer Networks, Computer Security, Educational Technology
Peer reviewedRoschelle, Jeremy; Penuel, William R.; Abrahamson, Louis – Educational Leadership, 2004
Classroom network requires every student to think actively, which enhances student participation in mathematics and science. Classroom-specific networks use software designed to enhance communication between teacher and students.
Descriptors: Computer Networks, Mathematics Education, Science Education, Computer Software
Dreyfus, Stuart E. – Bulletin of Science, Technology & Society, 2004
The author proposes a neural-network-based explanation of how a brain might acquire intuitive expertise. The explanation is intended merely to be suggestive and lacks many complexities found in even lower animal brains. Yet significantly, even this simplified brain model is capable of explaining the acquisition of simple skills without developing…
Descriptors: Brain, Experiential Learning, Reinforcement, Coping
Foster, Andrea L. – Chronicle of Higher Education, 2005
U.S. Supreme Court justices struggled in a lively debate with how to balance the competing interests of the entertainment industry and developers of file-sharing technology. Some justices sharply questioned whether it was fair to hold inventors of a distribution technology liable for copyright infringement, while others suggested that it was wrong…
Descriptors: Copyrights, Computer Networks, Court Litigation, Hearings
Brown, Douglas L. – Tech Directions, 2004
This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…
Descriptors: Educational Technology, Computer Networks, Computer Peripherals, Technology Education
Sander, Libby – Chronicle of Higher Education, 2008
After nearly three years of planning, Ohio's higher-education officials are finalizing an ambitious program to grant college credit for some technical courses offered at the state's adult-education centers. The program, called the Career-Technical Credit Transfer, is the latest in a string of state efforts to more closely link work-force training…
Descriptors: Community Colleges, Engineering, Computer Networks, Faculty
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Wang, Kening; Mulvenon, Sean W.; Stegman, Charles; Anderson, Travis – Journal of Educational Technology Systems, 2008
Google Maps API (Application Programming Interface), released in late June 2005 by Google, is an amazing technology that allows users to embed Google Maps in their own Web pages with JavaScript. Google Maps API has accelerated the development of new Google Maps based applications. This article reports a Web-based interactive mapping system…
Descriptors: Educational Research, Academic Achievement, Concept Mapping, Cognitive Mapping
Salas, Grace; Alexander, Julie S. – New Directions for Student Services, 2008
Regardless of whether an institution is a reluctant passenger on the racing technology train or itching to throw another shovel of coal on the fire, continuing advancements in technology make it a formidable factor in life on college campuses today. While students are updating their most recent social networking sites, faculty, staff, and…
Descriptors: Higher Education, Academic Achievement, Student Personnel Services, Technology Uses in Education
Page, G. Andrew; Hill, Melissa – New Directions for Adult and Continuing Education, 2008
Information, communication, and educational technologies hold promise to connect geographically isolated rural communities, offering adults greater access to educational, financial, and numerous other resources. The Internet and computer-based network technologies are often seen as remedies for communities in economic decline, but they also have…
Descriptors: Social Systems, Indigenous Populations, Rural Areas, Educational Technology
Semmelroth, Jim – Computers in Libraries, 2006
Asmall library's essential technical problem is that it has to chart a course through the technology shoals without a navigator on board. Small libraries in small towns often have a very low level of technical skill on staff. Furthermore, obtaining skilled technical support can frequently be pretty expensive. Even when one is available, a clever…
Descriptors: Public Libraries, Library Services, Computer Networks, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Turner, Judith Axler – Chronicle of Higher Education, 1988
Many suggestions by two researchers at Rand Corporation, who published a paper on etiquette for news networks, have been incorporated into bulletin-board conventions, but with new users coming online all the time socialization is slow. Some suggestions for e-mail users are provided. (MLW)
Descriptors: Bulletin Boards, Communications, Computer Networks, Electronic Mail
Peer reviewedDavis, Bill – Internet Reference Services Quarterly, 1996
Examines some of the changes that network technology has brought to academic computer services since the mid-1980s and discusses changes that may be expected in libraries as a result. Examples from the State University of New York College at Geneseo illustrate the discussion. Effects of the Internet are also considered. (LRW)
Descriptors: Academic Libraries, Change Agents, Computer Networks, Higher Education

Direct link
