NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
No Child Left Behind Act 20012
Assessments and Surveys
National Longitudinal Survey…1
What Works Clearinghouse Rating
Showing 1 to 15 of 77 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dunbar, Laura – General Music Today, 2015
Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."
Descriptors: Music Education, Teaching Methods, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Khamayseh, Yaser; Mardini, Wail; Aljawarneh, Shadi; Yassein, Muneer Bani – International Journal of Information and Communication Technology Education, 2015
In this paper, the authors are particularly interested in enhancing the education process by integrating new tools to the teaching environments. This enhancement is part of an emerging concept, called smart campus. Smart University Campus will come up with a new ubiquitous computing and communication field and change people's lives radically by…
Descriptors: Technology Integration, Handheld Devices, College Environment, Social Networks
Doss, Kevin T. – American School & University, 2012
Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…
Descriptors: Information Technology, School Security, Facilities Management, Telecommunications
Finkelstein, David – School Business Affairs, 2013
Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…
Descriptors: Identification, School Security, Students, Teachers
Peer reviewed Peer reviewed
Direct linkDirect link
Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas – British Journal of Educational Technology, 2008
This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…
Descriptors: Technology Uses in Education, Technological Advancement, Computer Storage Devices, Case Studies
McLester, Susan – District Administration, 2011
In the spring of 1999, 12 students and a teacher were killed by two gun-toting teenage boys at Columbine High School in Littleton, Colorado, making school safety and security an overnight priority in communities across the nation. Many schools are starting to borrow security methods and technology from the business world such as video intercoms,…
Descriptors: Video Technology, School Security, Educational Facilities Design, School Safety
Alexander, Rodney T. – ProQuest LLC, 2017
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…
Descriptors: Information Security, Statistical Analysis, Computers, Computer Security
Wiens, Janet – College Planning & Management, 2001
Discusses how to implement a smart card system at a college or university, and explains what smart cards are, their potential applications, benefits, and costs. Provides a resource for obtaining additional information about smart cards. (GR)
Descriptors: Colleges, Costs, Guidelines, Planning
Fickes, Michael – College Planning & Management, 2000
Discusses the evolution of smart cards from digital signatures and other innovations into the realm of magnetic-stripe cards to expand their applications. Examples of magnetic-strip smart card usage are examined. (GR)
Descriptors: Business, Higher Education, Student Needs
Peer reviewed Peer reviewed
Zuzack, Christine A. – Student Aid Transcript, 1997
Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…
Descriptors: Ancillary School Services, College Administration, Computer Uses in Education, Credit Cards
Wiens, Janet – College Planning & Management, 2001
Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)
Descriptors: College Administration, Higher Education, Program Administration, Program Development
Villano, Matt – Campus Technology, 2008
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Descriptors: Computer Uses in Education, Technological Advancement, Technology Uses in Education, Video Technology
Dalton-Noblitt, April – American School & University, 2012
In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…
Descriptors: School Safety, School Security, Facilities Management, Sexual Harassment
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Peer reviewed Peer reviewed
Birch, David – Internet Research, 1997
Technologies of payment rather than technologies of connection are the real trigger for the expansion of electronic commerce on the Internet. This article discusses "smart cards," highlighting Mondex, the electronic purse developed in the United Kingdom. Predicts that cash will be replaced by "e-cash," which is cheaper to make,…
Descriptors: Banking, Business, Financial Services, Foreign Countries
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6