NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 211 to 225 of 4,568 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ogawa, Nobuyuki; Shimizu, Akira – International Association for Development of the Information Society, 2017
This paper describes our concrete efforts to improve the functions of the computer rooms in the Information Processing Center from among several organisational strategies which can assume a large role in the next-generation education, while examining the practice of active learning by the faculty in all classes using ICT equipment. We implemented…
Descriptors: Educational Technology, Technology Uses in Education, Information Processing, Equipment
Peer reviewed Peer reviewed
Direct linkDirect link
Kok, Illasha; Beter, Petra; Esterhuizen, Hennie – International Journal of Distance Education Technologies, 2018
Fragmented connectivity in South Africa is the dominant barrier for digitising initiatives. New insights surfaced when a university-based nursing programme introduced tablets within a supportive network learning environment. A qualitative, explorative design investigated adult nurses' experiences of the realities when moving from paper-based…
Descriptors: Nurses, Handheld Devices, Information Technology, Blended Learning
Nychis, George P. – ProQuest LLC, 2013
In the past two decades, we have seen an unprecedented rise in unlicensed wireless devices and applications of wireless technology. To meet various application constraints, we continually customize the radios and their protocols to the application domain which has led to significant diversity in spectrum use. Unfortunately, this diversity (coupled…
Descriptors: Computer Networks, Telecommunications, Radio, Information Technology
Crane, Earl Newell – ProQuest LLC, 2013
The research problem that inspired this effort is the challenge of managing the security of systems in large-scale heterogeneous networked environments. Human intervention is slow and limited: humans operate at much slower speeds than networked computer communications and there are few humans associated with each network. Enabling each node in the…
Descriptors: Computer Security, Computer Networks, Artificial Intelligence, Decision Making
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Terasawa, Ikuo – Higher Education Studies, 2016
The challenge study is a project based learning curriculum at Technical High School aimed at the construction of a wireless communication system. The first period was engineering issues in the construction of an artificial satellite and the second period was a positional locating system based on the general purpose wire-less device--ZigBee device.…
Descriptors: Vocational High Schools, Technical Education, Telecommunications, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Halatchliyski, Iassen; Moskaliuk, Johannes; Kimmerle, Joachim; Cress, Ulrike – International Journal of Computer-Supported Collaborative Learning, 2014
This article discusses the relevance of large-scale mass collaboration for computer-supported collaborative learning (CSCL) research, adhering to a theoretical perspective that views collective knowledge both as substance and as participatory activity. In an empirical study using the German Wikipedia as a data source, we explored collective…
Descriptors: Computer Assisted Instruction, Cooperation, Cooperative Learning, Collaborative Writing
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Dawadi, Saraswati; Giri, Ram Ashish; Simkhada, Padam – Online Submission, 2020
The pandemic spread of Novel Coronavirus, also known as COVID-19, has significantly disrupted every aspects of human life, including education. The alarming spread of the virus caused a havoc in the educational system forcing educational institutions to shut down. According to a UNESCO report, 1.6 billion children across 191 countries have been…
Descriptors: Foreign Countries, COVID-19, Coping, Distance Education
Brooks, Tyson T. – ProQuest LLC, 2013
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Descriptors: Risk Management, Computer Security, Computer Software, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frolova, Elena V.; Ryabova, Tatyana M.; Rogach, Olga V. – European Journal of Contemporary Education, 2019
The dynamic development of information and communication technologies, the strengthening of the public demand for digitalization of various spheres of life, orient the Moscow education system towards the active introduction of digital technologies and high-tech educational environment development. The purpose of this article is to analyze the…
Descriptors: Information Technology, Technology Integration, Program Implementation, Barriers
Peer reviewed Peer reviewed
Direct linkDirect link
Hanrahan, Fidelma; Hughes, Ed; Banerjee, Robin; Eldridge, Alice; Kiefer, Chris – International Journal of Music Education, 2019
Little is currently known about the possible benefits of using networked technology to enhance ensemble performance. This study explored whether the introduction of specially devised technology -- networked tablets using traditional music notation -- to a primary school orchestra would enhance the experience of ensemble music. Particular emphasis…
Descriptors: Music Education, Music Activities, Elementary School Students, Music
Bandara, H. M. N. Dilum – ProQuest LLC, 2012
Resource-rich computing devices, decreasing communication costs, and Web 2.0 technologies are fundamentally changing the way distributed applications communicate and collaborate. With these changes, we envision Peer-to-Peer (P2P) systems that will allow for the integration and collaboration of peers with diverse capabilities to a virtual community…
Descriptors: Computer Networks, Cooperation, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Pages: 1  |  ...  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  ...  |  305