NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 121 to 135 of 4,561 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nisar Ahmad; Arif Alam; Ikram Shah – Knowledge Management & E-Learning, 2024
Information Communication Technology (ICT) is ubiquitous in the 21st century, hence both educators and learners need to integrate relevant ICT resources in their teaching and learning practices, to meet stakeholder's expectations and keep abreast with the race of technological advancement. The current research focuses on the analysis of ICT…
Descriptors: Foreign Countries, Information Technology, Communications, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pham, Quoc Trung; Tran, Thanh Phong – Knowledge Management & E-Learning, 2020
e-Learning systems nowadays become vital for many universities in developing countries. They are useful for increasing educational quality and providing students with high-quality learning resources. However, how to attract students to use e-learning systems and how to improve their learning outcomes through e-learning are still difficult…
Descriptors: Foreign Countries, Electronic Learning, Outcomes of Education, Computer Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
White, Tobin – International Journal of Computer-Supported Collaborative Learning, 2018
Classroom activity traditionally takes one of three forms, variously oriented toward the levels of individual students, small groups, or the whole class. CSCL systems, however, may enable novel ways to facilitate instruction within or sequence activity across these different levels. Drawing on theoretical accounts of learning at and across…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Class Activities, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Midi, Daniele – ProQuest LLC, 2016
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…
Descriptors: Internet, Computer Security, Game Theory, Resource Allocation
Peer reviewed Peer reviewed
Direct linkDirect link
Whitacre, Brian – Journal of Extension, 2019
In today's society, individuals and households without reliable Internet connections are increasingly at risk of facing significant disadvantages. This article describes an Extension-led pilot project in Oklahoma centered on addressing this issue through the establishment of a hotspot lending program in four rural libraries. Through the program,…
Descriptors: Program Development, Rural Areas, Public Libraries, Library Services
Peer reviewed Peer reviewed
Direct linkDirect link
Recalde, Jordi Mogas; Palau, Ramon; Galés, Neus Lorenzo; Gallon, Ray – International Journal of Mobile and Blended Learning, 2020
This paper presents results of a focus group that gathered data from principals of several public schools in Catalonia regarding the educational impact of Industry 4.0 technologies. Conclusions and recommendations are drawn from qualitative analysis with a view to improving smart classrooms via educational innovation. Results show that the schools…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Public Schools
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Archer, Elizabeth; Barnes, Glen – International Review of Research in Open and Distributed Learning, 2017
During this age of data proliferation, heavy reliance is placed on data visualisation to support users in making sense of vast quantities of information. Informational Dashboards have become the must have accoutrement for Higher Education institutions with various stakeholders jostling for development priority. Due to the time pressure and user…
Descriptors: Computer Networks, Data, Visual Aids, Databases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zancanaro, Airton; Nunes, Carolina Schmitt; Domingues, Maria Jose Carvalho de Souza – Turkish Online Journal of Distance Education, 2017
For the hosting, management and delivery of Massive Open Online Courses (MOOC) it is necessary a technological infrastructure that supports it. Various educational institutions do not have or do not wish to invest in such a structure, possibly because MOOCs are not yet part of official programs of universities, but initiatives by a particular…
Descriptors: Online Courses, Large Group Instruction, Delivery Systems, Technology Integration
Pisano, Mark – ProQuest LLC, 2017
Universities and Higher Education Institutions spend large sums of money to maintain and build network infrastructures. Current research and discussions in this area revolve around providing large amounts of bandwidth to students who live in a residence hall. However, there is a lack of information showing what is being used to support research…
Descriptors: Higher Education, Computer Networks, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Kundu, Arnab; Bej, Tripti; Dey, Kedar Nath – International Journal of Information and Learning Technology, 2020
Purpose: Self-efficacy is one's belief in one's ability. In this context, information and communication technology (ICT) self-efficacy is the judgment of one's capability to use ICT -- the familiar and effective teaching tools for the 21st century classrooms. The purpose of this empirical study was to investigate the correlation between teachers'…
Descriptors: Information Technology, Telecommunications, Self Efficacy, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Peer reviewed Peer reviewed
Direct linkDirect link
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Pages: 1  |  ...  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  ...  |  305