Publication Date
In 2025 | 0 |
Since 2024 | 8 |
Since 2021 (last 5 years) | 26 |
Since 2016 (last 10 years) | 88 |
Since 2006 (last 20 years) | 183 |
Descriptor
Source
Author
Herther, Nancy K. | 4 |
Johnson, L. | 4 |
Adams Becker, S. | 3 |
Branzburg, Jeffrey | 3 |
Falk, Howard | 3 |
Kline, Lanaii | 3 |
Paris, Judith | 3 |
Sonnemann, Sabine S. | 3 |
Bane, Robert K. | 2 |
Barker, Philip | 2 |
Baughman, M. Sue, Ed. | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 50 |
Teachers | 20 |
Researchers | 16 |
Administrators | 14 |
Media Staff | 12 |
Policymakers | 12 |
Students | 2 |
Support Staff | 2 |
Location
California | 10 |
Canada | 10 |
United Kingdom | 9 |
Australia | 6 |
United Kingdom (Scotland) | 6 |
Virginia | 5 |
Germany | 4 |
India | 4 |
Maryland | 4 |
New Jersey | 4 |
New York | 4 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Iwata, Jun; Clayton, John; Saravani, Sarah-Jane – International Association for Development of the Information Society, 2013
English has become increasingly important for Japanese medical professionals in Japan. However, the curricula at medical schools in Japan are so extensive that the time allocated for English classes is usually very limited, which means those classes often do not have the depth or scope to improve the English communication skills of medical…
Descriptors: Personal Autonomy, Medical Education, English (Second Language), Foreign Countries
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Alliance for Excellent Education, 2013
In the twenty-first century, learning takes place almost everywhere, at all times, on all kinds of paths and at all kinds of paces. With the click of a mouse or the touch of a screen, young people and adults can access a wealth of information, analyze it, and produce new knowledge at any time. These learning opportunities break wide open the…
Descriptors: Recognition (Achievement), Evaluation Methods, Information Storage, Labor Force Development
Herther, Nancy K. – Computers in Libraries, 2011
With the release of Google's App Inventor for Android, though still officially in beta, the company sought to make app development "simple but powerful" so that teachers could create study tips and quizzes, anyone could create geographic information systems (GIS) to help people find their way to some destination, and people could communicate over…
Descriptors: Geographic Information Systems, Internet, Libraries, Handheld Devices
Dula, Michael; Jacobsen, Lynne; Ferguson, Tyler; Ross, Rob – Computers in Libraries, 2012
This article presents the story of how Pepperdine University migrated its library management functions to the cloud using what is now known as OCLC's WorldShare Management Services (WMS). The story of implementing this new service is told from two vantage points: (1) that of the library; and (2) that of the service provider. The authors were the…
Descriptors: Pilot Projects, Library Administration, Management Systems, Internet
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Johnson, L.; Adams Becker, S.; Estrada, V.; Freeman, A. – New Media Consortium, 2014
The internationally recognized "NMC Horizon Report" series and regional "NMC Technology Outlooks" are part of the NMC Horizon Project, a 12-year effort established in 2002 that annually identifies and describes emerging technologies likely to have a large impact over the coming five years in every sector of education around the…
Descriptors: Electronic Libraries, Academic Libraries, Research Libraries, Information Management
Meloni, Julie – Education Digest: Essential Readings Condensed for Quick Review, 2011
It isn't a stretch to say that the definitions of "teaching online" and "teaching with technology" vary, even from instructor to instructor. Whatever the level of technology, and regardless of teachers' comfort level with it, one has to remember that for all that educational technology can offer through new communication methods and the ability to…
Descriptors: Educational Technology, Technology Uses in Education, Electronic Learning, Classroom Communication
Katzan, Harry, Jr. – Contemporary Issues in Education Research, 2010
Cloud computing is a technique for supplying computer facilities and providing access to software via the Internet. Cloud computing represents a contextual shift in how computers are provisioned and accessed. One of the defining characteristics of cloud software service is the transfer of control from the client domain to the service provider.…
Descriptors: Internet, Computer Software, Technology Uses in Education, Economic Factors
Flaherty, William – School Business Affairs, 2011
Spotsylvania County Public Schools (SCPS) in Virginia uses a document-imaging solution that leverages the features of a multifunction printer (MFP). An MFP is a printer, scanner, fax machine, and copier all rolled into one. It can scan a document and email it all in one easy step. Software is available that allows the MFP to scan bubble sheets and…
Descriptors: Computer System Design, Databases, Computer Uses in Education, School Districts
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Piovesan, Sandra Dutra; Passerino, Liliana Maria; Medina, Roseclea Duarte – International Association for Development of the Information Society, 2012
The diffusion of the use of the learning virtual environments presents a great potential for the development of an application which meet the necessities in the education area. In view of the importance of a more dynamic application and that can adapt itself continuously to the students' necessities, the "U-ALS" (Ubiquitous Adapted Learning…
Descriptors: Foreign Countries, Virtual Classrooms, Internet, Computer Software
Wang, Ting J.; Du, Hui; Lehmann, Constance M. – American Journal of Business Education, 2010
This paper proposes a teaching approach to reinforce accounting students' understanding of the concept of database normalization. Unlike a conceptual approach shown in most of the AIS textbooks, this approach involves with calculations and reconciliations with which accounting students are familiar because the methods are frequently used in…
Descriptors: Accounting, Database Design, Teaching Methods, Efficiency
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security