NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 16 to 30 of 3,432 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivan Jaramillo; Geovanny Brito; Anthony Pachay; Duval Carvajal – Journal of Technology and Science Education, 2023
Data repositories currently constitute essential programs within institutions. In fact, universities are the primary institutions that promote the creation, management and storage for the safekeeping of a variety of documents, data and/or projects. This work is carried out within the framework of institutional need and the application of knowledge…
Descriptors: Archives, Information Storage, Universities, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
Alberto Corbi; Daniel Burgos; Antonio Maria Perez – IEEE Transactions on Learning Technologies, 2024
Literate programming and cloud-operated open literate educational resources (COOLERs) have been catching the attention of the education community in recent years. This set of learning materials mainly comprises digital notebook-like documents, which are stored, backed, and delivered from cloud services and eventually displayed in students' web…
Descriptors: Information Storage, Open Educational Resources, Instructional Materials, Student Journals
Peer reviewed Peer reviewed
Direct linkDirect link
Liangqing Li – Education and Information Technologies, 2024
The purpose of the current article is to evaluate social responsibility, digital ethics, and knowledge about safe data storage among students of different ages. Four hundred students took part in the study: 200 people each in the first and fifth years of study. Their ages were 19.2 years (SD = 1.08) and 24.4 years (SD = 1.18), respectively. The…
Descriptors: Information Security, Social Responsibility, Ethics, Knowledge Level
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Kortemeyer, Gerd – Physics Teacher, 2022
In recent years, do-it-yourself microcontrollers and sensors have gained increased attention as measurement devices for physics teaching (see, for example, Refs. 1-5). This is not surprising, since Arduinos are relatively cheap and ubiquitous, the code base and design are open source, and there is a wide variety of sensors available. Arduinos can…
Descriptors: Physics, Measurement Equipment, Computers, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Bsharat, Marwan; Bsharat, Sawsan – Education and Information Technologies, 2023
Cloud computing service has been found to be effective in increasing the capacity of Higher Education Institutions (HEIs) since it delivers services through enhanced information technology capabilities. Quality of Service (QoS) in cloud service is considered a rapidly growing phenomenon to guarantee a high level of service and is identified as an…
Descriptors: Foreign Countries, Information Technology, Computer Software, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jake Carlson – Journal of Research Administration, 2023
Many funding agencies require researchers to include a data management plan with their grant applications explaining how they intend to make the data generated from the research publicly accessible. University administration and campus service providers could potentially leverage the content of data management plans to facilitate compliance and…
Descriptors: Data, Information Management, Grantsmanship, Research Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Haixiao Dai; Phong Lam Nguyen; Cat Kutay – Interactive Technology and Smart Education, 2024
Purpose: Digital learning systems are crucial for education and data collected can analyse students learning performances to improve support. The purpose of this study is to design and build an asynchronous hardware and software system that can store data on a local device until able to share. It was developed for staff and students at university…
Descriptors: Foreign Countries, Cooperative Learning, Rural Schools, Asynchronous Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Lin Zhu; Shujuan Xue – International Journal of Web-Based Learning and Teaching Technologies, 2024
In this article, the research of multimedia teaching video content feature extraction is carried out. According to the file structure, data type, and storage mechanism of the teaching video, a program is developed to automatically extract the structural features of the teaching video content, and a storage and retrieval database is established.…
Descriptors: Multimedia Instruction, Video Technology, Technology Uses in Education, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Xieling; Zou, Di; Cheng, Gary; Xie, Haoran; Jong, Morris – Education and Information Technologies, 2023
Researchers and practitioners are paying increasing attention to blockchain's potential for resolving trust, privacy, and transparency-related issues in smart education. Research on educational blockchain is also becoming an active field of research. Based on 206 studies published from 2017 to 2020, we identify contributors, collaborators,…
Descriptors: Educational Technology, Technology Uses in Education, Artificial Intelligence, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Satoshi Sugahara; Keita Kano; Sumitaka Ushio – Accounting Education, 2024
This study explores the role of the perceived image of accounting in determining key variables that influence high school accounting students' acceptance of using cloud accounting as a new technology. We adopted the technology acceptance model (TAM) as its theoretical framework. High school accounting students enrolled in the 'Kyoto Subaru High…
Descriptors: Foreign Countries, High School Students, Accounting, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Ruth Unsworth – Anthropology & Education Quarterly, 2024
Through an examination of ethnographic fieldwork data, this paper explores the ways in which cloud-based collaborative technologies created by Google "mediate" (Latour 1994) teachers' discussions around, agreement of and enactments of their classroom practices. Bringing together concepts from actor-network theory and literacy studies,…
Descriptors: Information Storage, Technology Uses in Education, Classroom Techniques, Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Kinde, Alehegn Adane; Addis, Assefa Chekole; Abebe, Getachew Gedamu – Public Services Quarterly, 2021
There is increasing pressure from funders, publishers, the public and other research organizations on researchers to improve their research data management. The main objective of the study was to examine the practices of research data management at higher education institutions in Ethiopia. The study was employed multi-stage sampling technique to…
Descriptors: Foreign Countries, Research, Data, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  229