NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 202439
Since 2021 (last 5 years)127
Since 2016 (last 10 years)352
Since 2006 (last 20 years)691
What Works Clearinghouse Rating
Showing 676 to 690 of 691 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Justine – T.H.E. Journal, 2006
Over the past five years, the No Child Left Behind Act, with its mandates for collecting and documenting student achievement statistics, has fueled a surge in the volume of data collected by schools, districts, and state education departments. This information explosion has gone hand in hand with technology's growing affordability and…
Descriptors: Federal Legislation, Teacher Effectiveness, Data Collection, Computer Security
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Sharef, Nurfadhlina Mohd, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2013
These proceedings contain the papers of the International Conference on Educational Technologies 2013 (ICEduTech 2013), which has been organised by the International Association for Development of the Information Society and co-organised by the Faculty of Computer Science & Information Technology, Universiti Putra Malaysia, Kuala Lumpur,…
Descriptors: Conference Papers, Educational Technology, Technology Uses in Education, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Carter, Howard; Snyder, Carolyn A.; Imre, Andrea – portal: Libraries and the Academy, 2007
Researchers from Southern Illinois University Carbondale (SIUC) surveyed faculty members from 10 academic research libraries to learn about scholarly publishing activities, attitudes, and policies. Areas of special interest included the effect of publishers' intellectual property policies and institutional promotion and tenure processes on library…
Descriptors: Correlation, Academic Rank (Professional), Incidence, Peer Evaluation
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Dow, C. R.; Huang, L. H.; Chen, K. H.; Chiu, J. C.; Lin, C. M. – International Journal of Distance Education Technologies, 2006
Growing Book refers to an electronic textbook that is co-developed, and has the ability to be constantly maintained, by groups of independent authors, thus creating a rich and ever-growing learning environment that can be conveniently accessible from anywhere. This work designs and implements a Web Service-based Growing Book that has the merits of…
Descriptors: Electronic Publishing, Textbooks, Educational Technology, Technology Uses in Education
Villano, Matt – Campus Technology, 2006
More and more colleges and universities today have discovered electronic record-keeping and record-sharing, made possible by document imaging technology. Across the country, schools such as Monmouth University (New Jersey), Washington State University, the University of Idaho, and Towson University (Maryland) are embracing document imaging. Yet…
Descriptors: Higher Education, Information Storage, Database Management Systems, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Vaillancourt, Jean-Pierre; Lambert, Gene; Popovich, Laura W. – TechTrends: Linking Research and Practice to Improve Learning, 2007
Delivery and formatting techniques for technical materials have traditionally been determined by common sense, not cognitive theory. In fact, for hundreds of years, verbal messages in the form of lecture and print have been the primary method of disseminating information to the learner. To move beyond verbal messages and toward the assimilation of…
Descriptors: Educational Strategies, Risk Management, Multimedia Materials, Communicable Diseases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kopp, Gail; Crichton, Susan – Canadian Journal of Learning and Technology, 2007
This research explores the idea of embedding and linking to existing content in learning object repositories and investigates teacher-designer use of learning objects within one high school mathematics course in an online school. This qualitative case study supports and extends the learning object literature, and brings forward context-specific…
Descriptors: Resource Units, High Schools, Secondary School Mathematics, Mathematics Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Verheul, Ingeborg – International Federation of Library Associations and Institutions (NJ3), 2006
In 2004-2005, The National Library of the Netherlands (Koninklijke Bibliotheek) conducted a survey for the IFLA-CDNL Alliance for Bibliographic Standards (ICABS)--an alliance founded jointly by the International Federation of Library Associations (IFLA), the Conference of Directors of National Libraries (CDNL) and the national libraries of…
Descriptors: Foreign Countries, Government Libraries, Cultural Background, Electronic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shujen – Policy Futures in Education, 2006
This article uses three case studies to examine the intersecting developments of technology, capitalism, and globalization through the contradictions and paradoxes of copyright governance and piracy. China is used as a case study to investigate the relations among the state, law, and global capitalism. (Contains 7 tables and 9 notes.)
Descriptors: Social Systems, Copyrights, Global Approach, Foreign Countries
Harley, Diane; Earl-Novell, Sarah; Arter, Jennifer; Lawrence, Shannon; King, C. Judson – Center for Studies in Higher Education, 2006
This study reports on five disciplinary case studies that explore academic value systems as they influence publishing behavior and attitudes of University of California, Berkeley faculty. The case studies are based on direct interviews with relevant stakeholders--faculty, advancement reviewers, librarians, and editors--in five fields: chemical…
Descriptors: College Faculty, Faculty Publishing, Case Studies, Values
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ruiz, Jorge G.; Smith, Michael; van Zuilen, Maria H.; Williams, Christine; Mintzer, Michael J. – Gerontology & Geriatrics Education, 2006
The purpose of this study was to examine whether training with a multimedia tutorial would have an impact on LPN students' knowledge of dementia care, attitudes toward dementia care, and self-efficacy ratings. A total of 38 nursing students participated. Pre-post comparisons of outcome measures revealed significant improvements in knowledge,…
Descriptors: Outcomes of Education, Residential Care, Nursing Students, Self Efficacy
Pages: 1  |  ...  |  37  |  38  |  39  |  40  |  41  |  42  |  43  |  44  |  45  |  46  |  47