Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 15 |
Descriptor
Source
Author
Ahlgrim-Delzell, Lynn | 1 |
Alexander, Michael | 1 |
Bacak, Julie | 1 |
Baker, Nick | 1 |
Basak, P. C. | 1 |
Brady D. Lund | 1 |
Bristow, Rob | 1 |
Brumm, Eugenia K. | 1 |
Bulick, Stephen | 1 |
Byker, Erik Jon | 1 |
Cahill, Adrian J. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 11 |
Elementary Secondary Education | 4 |
Postsecondary Education | 4 |
Elementary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Administrators | 3 |
Media Staff | 2 |
Practitioners | 2 |
Teachers | 1 |
Location
Australia | 2 |
Canada | 2 |
India | 1 |
Indiana | 1 |
Maryland | 1 |
Netherlands | 1 |
Texas | 1 |
United Kingdom | 1 |
United Kingdom (Great Britain) | 1 |
United States | 1 |
Laws, Policies, & Programs
Fair Labor Standards Act | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Li, Qing; Zhao, Jianmin; Zhu, Xinzhong – International Journal of Distance Education Technologies, 2009
Supporting efficient data access in the mobile learning environment is becoming a hot research problem in recent years, and the problem becomes tougher when the clients are using light-weight mobile devices such as cell phones whose limited storage space prevents the clients from holding a large cache. A practical solution is to store the cache…
Descriptors: Electronic Learning, Research Problems, Statistical Data, Statistical Inference
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2010
Cloud computing is increasingly popular in education. Cloud computing is "the delivery of computer services from vast warehouses of shared machines that enables companies and individuals to cut costs by handing over the running of their email, customer databases or accounting software to someone else, and then accessing it over the internet."…
Descriptors: Computer Software, Internet, Computer Software Evaluation, Computer Networks
Diffin, Jennifer; Chirombo, Fanuel; Nangle, Dennis; de Jong, Mark – Journal of Web Librarianship, 2010
This article explains how the document management team (circulation and interlibrary loan) at the University of Maryland University College implemented Microsoft's SharePoint product to create a central hub for online collaboration, communication, and storage. Enhancing the team's efficiency, organization, and cooperation was the primary goal.…
Descriptors: Distance Education, Cooperation, Educational Technology, Library Services
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
O'Hanlon, Charlene – T.H.E. Journal, 2009
On Dec. 1, 2006, the once ambiguous role of e-mails in court cases became much more clear. On that day, the Federal Rules of Civil Procedure (FRCP), which govern federal civil litigation, were amended to establish standards for the discovery of electronically stored information, now known as e-discovery. Many corporations began moving quickly to…
Descriptors: Emergency Programs, Labor Standards, School Districts, Court Litigation
Khanna, Pankaj; Basak, P. C. – Turkish Online Journal of Distance Education, 2011
It is proposed to establish an Integrated Distance Education System in India by designing modern technology based information communication network, connecting all its ODL (Open and Distance Learning) institutions to the headquarters of the ODL system in India. The principle roles to be performed by such a system have been discussed; according to…
Descriptors: Foreign Countries, Distance Education, Educational Technology, Cost Effectiveness
Cahill, Adrian J.; Sreenan, Cormac J. – Interactive Technology and Smart Education, 2006
This paper examines the design and evaluation of a TV on Demand (TVoD) system, consisting of a globally accessible storage architecture where all TV content broadcast over a period of time is made available for streaming. The proposed architecture consists of idle Internet Service Provider (ISP) servers that can be rented and released dynamically…
Descriptors: Management Systems, Internet, Mathematics, Television
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods

Hendricks, Arthur; Wang, Jian – Library Hi Tech, 2002
Reports the results of a Web-based survey that investigated what plans, if any, librarians have for dealing with the expected obsolescence of the floppy disk and still retain effective library service. Highlights include data storage options, including compact disks, zip disks, and networked storage products; and a copy of the Web survey.…
Descriptors: Computer Networks, Computer Storage Devices, Floppy Disks, Information Storage