Publication Date
| In 2024 | 36 |
| Since 2023 | 48 |
| Since 2020 (last 5 years) | 98 |
| Since 2015 (last 10 years) | 221 |
| Since 2005 (last 20 years) | 836 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 400 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 54 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 34 |
| Japan | 30 |
| New York | 29 |
| Pennsylvania | 25 |
| Florida | 24 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Hashim, Ayesha K. – Journal of Education Finance, 2022
Internet connectivity has become a critical resource for teaching and learning. The Common Core State Standards (CCSS) is a prime example, with schools expected to implement online assessments and use online resources for instruction. Yet there is little known about the extent to which local education agencies (LEAs) and schools are taking…
Descriptors: Common Core State Standards, Computer Assisted Testing, Longitudinal Studies, School Districts
Mikroyannidis, Alexander; Gómez-Goiri, Aitor; Smith, Andrew; Domingue, John – Interactive Learning Environments, 2020
The main challenges commonly associated with acquiring practical network engineering skills are the requirements for access to specialised and up-to-date network equipment, as well as the high costs associated with obtaining and maintaining this equipment. The PT Anywhere initiative addresses these challenges by offering a mobile environment for…
Descriptors: Computer Science Education, Computer Networks, Data Analysis, Engineering
Laukens, Kris; Eyckmans, Marleen; De Neuter, Nicolas; Naulaerts, Stefan; Meysman, Pieter; Van Ostade, Xaveer – Journal of Biological Education, 2021
While computational biology and bioinformatics became an inherent part of most life science degrees, it remains challenging to encourage students to employ these diverse skills in a practical research context. In this education paper, we present a method to enable students to acquire hands-on skills by the data-driven study of complex biomolecular…
Descriptors: Data Analysis, Communicable Diseases, Molecular Biology, Science Instruction
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Czerkawski, Betul C. – Interactive Learning Environments, 2016
The considerable increase in web-based knowledge networks in the past two decades is strongly influencing learning environments. Learning entails information retrieval, use, communication, and production, and is strongly enriched by socially mediated discussions, debates, and collaborative activities. It is becoming critical for educators to…
Descriptors: Computer Networks, Instructional Design, Educational Needs, Information Retrieval
Nychis, George P. – ProQuest LLC, 2013
In the past two decades, we have seen an unprecedented rise in unlicensed wireless devices and applications of wireless technology. To meet various application constraints, we continually customize the radios and their protocols to the application domain which has led to significant diversity in spectrum use. Unfortunately, this diversity (coupled…
Descriptors: Computer Networks, Telecommunications, Radio, Information Technology
Crane, Earl Newell – ProQuest LLC, 2013
The research problem that inspired this effort is the challenge of managing the security of systems in large-scale heterogeneous networked environments. Human intervention is slow and limited: humans operate at much slower speeds than networked computer communications and there are few humans associated with each network. Enabling each node in the…
Descriptors: Computer Security, Computer Networks, Artificial Intelligence, Decision Making
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Willis, Jason; Krausen, Kelsey; McClellan, Patrick – WestEd, 2021
The COVID-19 pandemic offers an opportunity to reconsider the approach and delivery of public education. With a large infusion of one-time federal relief aid and a depth of need among students most impacted by the COVID-19 pandemic that the system is still trying to understand, state and local education leaders will need to plan for both (1)…
Descriptors: Educational Finance, Federal Aid, Federal Legislation, COVID-19
Blom, Helen; Segers, Eliane; Knoors, Harry; Hermans, Daan; Verhoeven, Ludo – Journal of Computer Assisted Learning, 2018
This study aims to investigate secondary school students' reading comprehension and navigation of networked hypertexts with and without a graphic overview compared to linear digital texts. Additionally, it was studied whether prior knowledge, vocabulary, verbal, and visual working memory moderated the relation between text design and…
Descriptors: Reading Comprehension, Navigation (Information Systems), Computer Networks, Hypermedia
Halatchliyski, Iassen; Moskaliuk, Johannes; Kimmerle, Joachim; Cress, Ulrike – International Journal of Computer-Supported Collaborative Learning, 2014
This article discusses the relevance of large-scale mass collaboration for computer-supported collaborative learning (CSCL) research, adhering to a theoretical perspective that views collective knowledge both as substance and as participatory activity. In an empirical study using the German Wikipedia as a data source, we explored collective…
Descriptors: Computer Assisted Instruction, Cooperation, Cooperative Learning, Collaborative Writing
Ogawa, Nobuyuki; Shimizu, Akira – International Association for Development of the Information Society, 2017
This paper describes our concrete efforts to improve the functions of the computer rooms in the Information Processing Center from among several organisational strategies which can assume a large role in the next-generation education, while examining the practice of active learning by the faculty in all classes using ICT equipment. We implemented…
Descriptors: Educational Technology, Technology Uses in Education, Information Processing, Equipment
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students

Peer reviewed
Direct link
