Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Cronin, John J. – Journal of Marketing Education, 2009
Wikis are one of the newest features of Web 2.0. This article describes the implementation of a project in a marketing course in which students created an interactive textbook using wiki software. Several surprises encountered along the way are described, and the unique problem of grading individual contributions to a wiki is discussed. The author…
Descriptors: Marketing, Educational Technology, Hypermedia, Cooperative Learning
Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos – Computers and Education, 2007
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…
Descriptors: Computer Security, Distance Education, Computer Networks, Educational Environment
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Dumitrascu, Eugen; Popa, Marius – Journal of Applied Quantitative Methods, 2007
In this paper, we present the characteristic features of distributed applications. We also enumerate the modalities of optimizing them and the factors that influence the quality of distributed applications, as well as the way they are affected by the optimization processes. Moreover, we enumerate the quality characteristics of distributed…
Descriptors: Computer Oriented Programs, Computer Networks, Improvement, Computer Software
Hegedus, Stephen – Educational Technology, 2007
This article shows how highly mobile computing, when used with new forms of network connectivity, can allow new forms of activities in the mathematics classroom. Examples are provided, such as the ability to share, harvest, and aggregate mathematical objects, and the ability for teachers and students to analyze the entire set of classroom…
Descriptors: Computer Uses in Education, Computer Networks, College Mathematics, Calculus
Azeta, A. A.; Oyelami M. O. – Online Submission, 2008
With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge, rather, an electronic means of learning has continued to evolve. Electronic learning (e-Learning), which facilitates education using communications networks, has made learning…
Descriptors: Computer Uses in Education, Computer Software, Computer Networks, Computer Mediated Communication
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Dawson, Phillip – Australasian Journal of Educational Technology, 2010
This article presents an argument for the use of networked interactive whiteboards (NIWBs) in regional Australian higher education and identifies new pedagogies for this context. Most Australian universities operate multiple campuses, and many use video conference facilities to deliver courses across these sites. For students at remote video…
Descriptors: Higher Education, Computer Assisted Instruction, Lecture Method, Regional Programs
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Western Interstate Commission for Higher Education, 2009
A forward-thinking National Broadband Strategy should focus on the transformative power of advanced networks to unleash new waves of innovation, jobs, economic growth, and national competitiveness. Such a strategy should create new tools to deliver health care, education, and a low carbon economy. The American Recovery and Reinvestment Act…
Descriptors: Computer Networks, Futures (of Society), Economic Progress, Social Change
Butler, LeRoy – EDUCAUSE Quarterly, 2009
Lourdes College is a small, private, coeducational commuter college located in northwest Ohio. In early 2009, the Lourdes College Board of Trustees ratified a new strategic plan promoting institutional strength and sustainability over the next six years. The desired outcome was to make Lourdes College a stronger, more vibrant, even more socially…
Descriptors: Strategic Planning, Commuter Colleges, Sustainable Development, Feasibility Studies
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Johnson, L.; Smith, R.; Levine, A.; Haywood, K. – New Media Consortium, 2010
The "Horizon Report" series is the most visible outcome of the New Media Consortium's Horizon Project, an ongoing research effort established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. This volume, the "2010…
Descriptors: Advisory Committees, Elementary Secondary Education, Creative Activities, Global Approach
Federal Communications Commission, 2010
In early 2009, Congress directed the Federal Communications Commission (FCC) to develop a National Broadband Plan to ensure every American has "access to broadband capability." Congress also required that this plan include a detailed strategy for achieving affordability and maximizing use of broadband to advance "consumer welfare, civic…
Descriptors: Telecommunications, Computer Networks, Information Technology, Federal Programs

Peer reviewed
Direct link
