NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1,516 to 1,530 of 1,536 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Peslak, Alan – Journal of Information Technology Education, 2005
Researchers have suggested that up to 50 % of the effort in development of information systems is devoted to user interface development (Douglas, Tremaine, Leventhal, Wills, & Manaris, 2002; Myers & Rosson, 1992). Yet little study has been performed on the inclusion of important interface and human-computer interaction topics into a current…
Descriptors: Assignments, Student Attitudes, Information Systems, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Gogoulou, Agoritsa; Gouli, Evangelia; Grigoriadou, Maria; Samarakou, Maria; Chinou, Dionisia – Educational Technology & Society, 2007
In this paper, we present a web-based educational setting, referred to as SCALE (Supporting Collaboration and Adaptation in a Learning Environment), which aims to serve learning and assessment. SCALE enables learners to (i) work on individual and collaborative activities proposed by the environment with respect to learners' knowledge level, (ii)…
Descriptors: Teacher Education Programs, College Students, Student Attitudes, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Charlie C.; Shang, Rong-An; Harris, Albert – International Journal of Distance Education Technologies, 2006
Case method teaching is a method of instruction that can improve the cognitive learning process. This method is used extensively in face-to-face classes. However, when it is applied to a distance education class in an online asynchronous environment, learning outcomes may differ. This article reports on a study that compares the use of case method…
Descriptors: Case Method (Teaching Technique), Online Courses, Asynchronous Communication, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Schmidtlein, Frank A. – Tertiary Education and Management, 2004
The current interest in governmental assessment and accountability practices appears to result from:(1) an emerging view of higher education as an "industry"; (2) concerns about efficient resource allocation; (3) a lack of trust ade between government institutional officials; (4) a desire to reduce uncertainty in government/higher education…
Descriptors: Higher Education, Governance, Information Systems, Resource Allocation
Colorado Commission on Higher Education, 2004
The College Guide to Colorado's Public Higher Education Institutions presents a snapshot of important information to guide students in choosing a college or university that is right for them. It helps students compare significant information on all the schools and the communities in which they are located. This guide is a tool available to…
Descriptors: Higher Education, Career Choice, College Choice, College Preparation
Peer reviewed Peer reviewed
Direct linkDirect link
Tanrikulu, Zuhal – EDUCAUSE Quarterly, 2006
Many universities are reevaluating their traditional educational methods and providing pedagogical material through the Internet. Some Web-based systems offer a constructionist learning environment, for example, where students can learn by designing their own objects. Providing effective, convenient technology to support learning is important, and…
Descriptors: Management Information Systems, Foreign Countries, Internet, Educational Methods
Johnson, David R.; Sword, Carrie; Habhegger, Barbara – National Center on Secondary Education and Transition (NCSET), University of Minnesota, 2005
Work-Based Learning (WBL) is an effective approach in delivering career and technical education and training to youth with disabilities. This handbook provides guidance to schools operating WBL programs and encourages the adoption of WBL programs by schools not presently using this approach. By following the information and examples in this…
Descriptors: Technical Education, School Personnel, Youth, Disabilities
Peer reviewed Peer reviewed
Direct linkDirect link
Parker, Kevin R.; LeRouge, Cynthia; Trimmer, Ken – Journal of Information Technology Education, 2005
Systems Analysis and Design is a core component of an education in information systems. To appeal to a wider range of constituents and facilitate the learning process, the content of a traditional Systems Analysis and Design course has been supplemented with an alternative modeling approach. This paper presents an instructional design that…
Descriptors: Educational Strategies, Accounting, Models, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Sicilia, Miguel-Angel – Journal of Information Technology Education, 2005
Personalization technology has become an important topic in e-commerce, fostered by the emergence of the relationship-marketing paradigm. But teaching e-commerce personalization technology is a challenging task, since it requires a balance between marketing and management and technical implementation issues that must be calibrated according to the…
Descriptors: Models, Business, Hypermedia, Marketing
Peer reviewed Peer reviewed
Direct linkDirect link
Gercek, Gokhan; Saleem, Naveed – Journal of Information Technology Education, 2005
Budgetary constraints are almost a constant challenge confronted by academia. In the case of small colleges and universities, these constraints become even more pronounced when these institutions enhance their programs to meet the needs of their constituents. While in some cases program enhancement might simply be accomplished by hiring new…
Descriptors: Laptop Computers, Computer Centers, Technology Planning, Educational Finance
WCET, 2002
Most campuses, recognizing the important role that student services play in learner success and retention, have a full range of student services in place to support their on-campus learners. Yet, many have failed to provide the same level of service to their off-campus learners who cannot come to campus. All students deserve access to a full array…
Descriptors: Higher Education, Educational Technology, Guidelines, Information Systems
Business-Higher Education Forum (NJ1), 2005
This report warns that if current trends continue, the United States will lose is preeminence in science and technology and its leadership position in innovation. In this report, the Business-Higher Education Forum (BHEF) proposes a four-part action plan in which business, higher education, and policy leaders support P-12 education leaders in…
Descriptors: Higher Education, Holistic Approach, Information Systems, Educational Change
Peer reviewed Peer reviewed
Direct linkDirect link
Senapathi, Mali – Journal of Information Technology Education, 2005
The aim of the research is to derive a framework for the evaluation of Computer Aided Software Engineering (CASE) tool learnability in educational environments. Drawing from the literature of Human Computer Interaction and educational research, a framework for evaluating CASE tool learnability in educational environments is derived. The two main…
Descriptors: Evaluation Criteria, Evaluation Methods, Case Studies, Educational Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Bahli, Bouchaib; Buyukkurt, Meral Demirbag – Journal of Information Technology Education, 2005
The importance of teamwork in Information Systems Development (ISD) practice and education has been acknowledged but not studied extensively to date. This paper tests a model of how groups participating in ISD projects perform and examines the relationships between some antecedents of this performance based on group research theory well…
Descriptors: Business, Research Methodology, Team Training, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Pages: 1  |  ...  |  93  |  94  |  95  |  96  |  97  |  98  |  99  |  100  |  101  |  102  |  103