NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 136 to 150 of 4,561 results Save | Export
Solomon Mosisa Gofere – ProQuest LLC, 2023
This dissertation addresses three separate questions in human capital and development economics. In the first chapter, I study how college admission concerns drive students' field choices in a field-specific college admission system. To study this question, I leverage a college admission policy reform in Ethiopia that sharply increased the…
Descriptors: Human Capital, STEM Education, State Universities, College Admission
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Graham, Kendra; Anderson, James; Rife, Conrad; Heitmeyer, Bryce; Patel, Pranav R.; Nykl, Scott; Lin, Alan C.; Merkle, Laurence D. – IEEE Transactions on Learning Technologies, 2020
Cyberspace odyssey (CSO) is a novel serious game supporting computer networking education by engaging students in a race to successfully perform various cybersecurity tasks in order to collect clues and solve a puzzle in virtual near-Earth three-dimensional space. Each team interacts with the game server through a dedicated client presenting a…
Descriptors: Computer Networks, Information Security, Task Analysis, Computer Games
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – International Journal of Computer Science Education in Schools, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Mehta, Vedant; Lane, Charles D. – Physics Education, 2018
SenseCube is a multisensor capable of measuring many different real-time events and changes in environment. Most conventional sensors used in introductory-physics labs use their own software and have wires that must be attached to a computer or an alternate device to analyze the data. This makes the standard sensors time consuming, tedious, and…
Descriptors: Physics, Science Instruction, Teaching Methods, Laboratory Experiments
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2018
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in…
Descriptors: Undergraduate Students, Business Schools, Information Technology, Information Systems
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – Online Submission, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Campbell, Wendy – ProQuest LLC, 2017
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Descriptors: Internet, Information Technology, Information Security, Universities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Öncü, Semiral; Bichelmeyer, Barbara A. – Participatory Educational Research, 2021
Learners have to engage in academically purposeful instructional endeavors to be successful in school. Latest research indicates that the learners of today are not as interested in educational deeds as they need to be. Educational stakeholders should look for means to address this tendency to have a positive influence on educational results. This…
Descriptors: Instructional Effectiveness, Learner Engagement, Blended Learning, Educational Certificates
Diane P. Fabian – ProQuest LLC, 2021
The patient portal is an electronic repository of health information, including doctor's notes, laboratory test results, and diagnostic imaging reports. There are limited studies that explore how individuals make sense of their health information, and use that understanding to increase health literacy. Education leaders should consider the ways…
Descriptors: Community Colleges, Patients, Allied Health Occupations Education, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nguyen, Quan; Poquet, Oleksandra; Brooks, Christopher; Li, Warren – International Educational Data Mining Society, 2020
Network analysis in educational research has primarily relied on self-reported relationships or connections inferred from online learning environments, such as discussion forums. However, a large part of students' social connections through day-to-day on-campus encounters has remained underexplored. The paper examines spatial-temporal student…
Descriptors: Social Networks, Network Analysis, Data Analysis, Computer Networks
Al-Khouri, Ali M. – Educational Technology, 2015
This article proposes that the widespread availability of wireless networks creates a case in which there is no real need for SIM cards. Recent technological developments offer the capability to outperform SIM cards and provide more innovative dimensions to current systems of mobility. In this context of changing realities in the domain of…
Descriptors: Computer Networks, Telecommunications, Technological Advancement, Innovation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Pages: 1  |  ...  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  ...  |  305