NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 31 to 45 of 4,532 results Save | Export
Chris Sanders – ProQuest LLC, 2021
Despite significant investment in cyber security, the industry is unable to stem the tide of damaging attacks against computer networks. This unfortunate situation is, in part, because cyber security exists in a state of cognitive crisis defined by tacit knowledge and poorly understood processes. At the heart of the crisis are digital forensic…
Descriptors: Cognitive Ability, Thinking Skills, Crime, Computer Security
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Douglas R. Bowie – ProQuest LLC, 2023
This mixed methods research study explores the university student learning experience of IP subnetting. Using a constructivist perspective, VR software was designed, written, and utilized in a learning process to gather both quantitative and qualitative data about the experience of learning IP subnetting. Participants underwent pre-test and…
Descriptors: Simulated Environment, Computer Simulation, Student Experience, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Livia Tomás; Ophélie Bidet – International Journal of Social Research Methodology, 2024
Qualitative research has been strongly affected by the COVID-19 pandemic, highlighting the possibilities that Voice over Internet Protocol (VoIP) technologies such as Skype, WhatsApp, and Zoom offer to qualitative scholars. Based on the experience of using such technologies to collect qualitative data for our PhD studies, we present how we dealt…
Descriptors: Telecommunications, Qualitative Research, Interviews, Interpersonal Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Teresa Swist; Thilakshi Mallawa Arachchi; Jenna Condie; Benjamin Hanckel – Learning, Media and Technology, 2024
The COVID-19 pandemic sparked an unprecedented expansion of educational technologies and digitisation of the university sector, and also amplified existing inequalities and crises. In this paper, we introduce the 'socio-technically just pedagogies framework' to systemically explore curriculum-making, student-staff partnerships, knowledge…
Descriptors: Foreign Countries, College Students, College Faculty, Teacher Student Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Barlowe, Scott – IEEE Transactions on Education, 2021
Contribution: This article demonstrates that social, cultural, economic, and political topics can be effectively addressed in the context of traditional computer science and engineering topics with few additional resources and little coordination. Background: Social, cultural, economic, and political influences are often secondary topics in…
Descriptors: Global Approach, Computer Science Education, Computer Networks, Social Influences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Peer reviewed Peer reviewed
Direct linkDirect link
Geoff Woolcott; Vinh Bui – European Journal of Open, Distance and E-Learning, 2023
The transition to fully online delivery in the COVID-19 pandemic has added to already existing and significant challenges in subjects and programs that require a component of practicum, on-site experience or hands-on laboratory work. This article presents initial results from a study that responds to challenges arising in moving to a fully online…
Descriptors: Classroom Environment, Computer Networks, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Love Börjeson; Chris Haffenden; Martin Malmsten; Fredrik Klingwall; Emma Rende; Robin Kurtz; Faton Rekathati; Hillevi Hägglöf; Justyna Sikora – College & Research Libraries, 2024
This article provides an account of the making of KBLab, the data lab at the National Library of Sweden (KB). The first part discusses the work involved in establishing a lab as both a physical and a digital site for researchers to use digital collections at previously unimaginable scales. The second part explains how the lab has deployed the…
Descriptors: Foreign Countries, Government Libraries, Artificial Intelligence, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Reisdorf, Bianca C.; Yankelevich, Aleksandr; Shapiro, Mitch; Dutton, William H. – Education and Information Technologies, 2019
As many as three million households with school-aged children in the United States do not have any Internet service at home, and 18% do not have a broadband connection, creating a "homework gap" between those who can access the Internet to support their schoolwork at home, and those who cannot. Based on a series of empirical case studies…
Descriptors: Access to Computers, Disadvantaged, Internet, Homework
Peer reviewed Peer reviewed
Direct linkDirect link
Luse, Andy; Rursch, Julie – British Journal of Educational Technology, 2021
Engineering and technology educators continually strive for realistic, hands-on laboratory exercises to enhance their students' learning. This research describes the redesign of an undergraduate introductory computer networking course to include new weekly virtual laboratory assignments that culminate in a 'real world' final project of configuring…
Descriptors: Experiential Learning, Computer Science Education, Curriculum Design, Undergraduate Study
Ma, Xiao – ProQuest LLC, 2018
Current network design problems can be solved by offline or online methods. Offline methods are criticized for their complexity and in flexibility, whereas online methods lack guaranteed optimality. Non-blocking properties, which are typically studied in switching structures, could be used to evaluate the capability of a switching structure to…
Descriptors: Computer Networks, Design, Graphs, Mathematics
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  303