Publication Date
In 2025 | 7 |
Since 2024 | 60 |
Since 2021 (last 5 years) | 108 |
Since 2016 (last 10 years) | 231 |
Since 2006 (last 20 years) | 806 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 400 |
Teachers | 174 |
Administrators | 148 |
Policymakers | 90 |
Media Staff | 56 |
Researchers | 54 |
Students | 24 |
Parents | 12 |
Community | 5 |
Counselors | 2 |
Location
Canada | 95 |
United States | 80 |
United Kingdom | 59 |
Australia | 47 |
California | 38 |
Texas | 33 |
Japan | 30 |
New York | 30 |
Florida | 25 |
Pennsylvania | 25 |
Finland | 22 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Does not meet standards | 1 |
Priyanshi Garg; S. P. Raja – International Journal of Learning and Change, 2024
Green internet of things is important to achieve atmospheric decarbonisation, it is crucial to implement procedures and practices that prioritise resource conservation and environmental protection. However, the growing use of internet of things devices poses a challenge due to their high-energy requirements for data reception and transmission…
Descriptors: Computer Interfaces, Internet, Equipment, Computer Networks
Katharina C. Cramer; Nicolas V. Rüffin – Minerva: A Review of Science, Learning and Policy, 2025
Political interest in Research Infrastructures on a European scale has been a new phenomenon, marked in the early 2000s with the launch of the Lisbon Strategy and the European Research Area. European Research Infrastructure policy then developed through, first, the strategic incorporation of incumbents through new modes of coordination; second,…
Descriptors: Research, Foreign Countries, Computer Networks, Computer Interfaces
Kathy D. Lohr – New Directions for Adult and Continuing Education, 2025
Having access to the Internet and acquiring the skills necessary to use, question, and create in a digital environment have become essential to living and working in the 21st century. Yet, this move to digitalization has created a digital divide between those who have broadband "access" and the "skills and attitudes" to…
Descriptors: Digital Literacy, Access to Internet, Equal Education, Global Approach
Ünlüsoy, Asli; Leander, Kevin M.; de Haan, Mariëtte – E-Learning and Digital Media, 2022
Understanding the affordances that networked platforms offer is a good place to start rethinking our notions of learning. The article discusses how social connectivity has changed, arguing that networking and networks have become foregrounded in how we perceive and experience our (digital) social worlds. Our aim is to understand the nature of…
Descriptors: Affordances, Social Media, Learning, Social Change
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Khalid Mohiuddin; Huda Fatima; Mohiuddin Ali Khan; Mohammad Abdul Khaleel; Zeenat Begum; Sajid Ali Khan; Omer Bin Hussain – SAGE Open, 2023
This article aims to design a novel edge-centric hierarchical cloud architecture to optimize mobile learning (m-learning) performance during learners executing computation-intensive learning applications. This research adopts the potential of distributed computing paradigms, that is, mobile edge, for improving the effectiveness of m-learning…
Descriptors: Computer Networks, Electronic Learning, College Students, Handheld Devices
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Xu Yaqian; Zheng Qinhua – Interactive Learning Environments, 2024
The interactive mechanism between social and concept networks is a key question in connectivist learning, which explains the impact of interaction on cognitive development and knowledge generation. The successful practice of "Internet Change Education: Dialogue between Theory and Practice", the first cMOOC in China, provides data support…
Descriptors: Correlation, Social Networks, Status, MOOCs
Ayadi, Mohamed Issam; Maizate, Abderrahim; Ouzzif, Mohammed; Mahmoudi, Charif – International Journal of Web-Based Learning and Teaching Technologies, 2021
In this paper, the authors propose a novel forwarding strategy based on deep learning that can adaptively route interests/data packets through ethernet links without relying on the FIB table. The experiment was conducted as a proof of concept. They developed an approach and an algorithm that leverage existing intelligent forwarding approaches in…
Descriptors: Computer Networks, Artificial Intelligence, Mathematics, Models
XiFeng Liao – International Journal of Information and Communication Technology Education, 2024
A modern technology-supported vocational educational system significantly affects the quality of vocational training and contributes to the innovation and economic development of the regional area. The visualization literature analysis was adopted with the purpose of exploring the theoretical framework for developing a 6G-assisted network to…
Descriptors: Computer Networks, Information Networks, Technology Integration, Regional Cooperation
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Jorge J. Mendieta – ProQuest LLC, 2021
This qualitative descriptive study explored how full-time faculty of a California higher education institution described their experience with the Information Technology Services employees' commitment, communications, and quality of customer service when resolving classroom Wi-Fi issues. The study used the model of Total Quality Management (TQM)…
Descriptors: Information Technology, Higher Education, Technical Support, Teacher Attitudes
Rui Du – International Journal of Information and Communication Technology Education, 2024
In the context of the multimedia era, college counselors and college students should make progress together. This article aims to explore the practical issues of applying multimedia and visual-image technology to the training of college counselors. We propose a three-dimensional multimedia visual image recognition technology based on convolutional…
Descriptors: Multimedia Materials, Visual Aids, Video Technology, School Counselors
Nan Wu – International Journal of Web-Based Learning and Teaching Technologies, 2024
Higher education is becoming increasingly competitive and all educational institutions are concentrating on improving quality and changing traditional higher education teaching methods. New-type classroom instruction has embraced a unique advancement opportunity with the arrival of the fifth generation (5G) era. It is critical to develop a…
Descriptors: Instructional Effectiveness, Internet, Computer Literacy, Artificial Intelligence
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory