Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Access to Information | 4 |
Information Storage | 4 |
Student Attitudes | 4 |
Technology Uses in Education | 4 |
Educational Technology | 3 |
Foreign Countries | 3 |
Information Management | 3 |
Likert Scales | 3 |
Student Surveys | 3 |
Undergraduate Students | 3 |
Case Studies | 2 |
More ▼ |
Author
Altun, Arif | 1 |
Ciampa, Mark | 1 |
Ilgaz, Hale | 1 |
Lin, Charlie | 1 |
Mazma, Sacide Güzin | 1 |
Wang, Jenny | 1 |
Yu, Wei-Chieh Wayne | 1 |
Publication Type
Reports - Research | 3 |
Journal Articles | 2 |
Collected Works - Proceedings | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Location
Turkey | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lin, Charlie; Yu, Wei-Chieh Wayne; Wang, Jenny – World Journal of Education, 2014
Cloud computing technologies, such as Google Docs, Adobe Creative Cloud, Dropbox, and Microsoft Windows Live, have become increasingly appreciated to the next generation digital learning tools. Cloud computing technologies encourage students' active engagement, collaboration, and participation in their learning, facilitate group work, and support…
Descriptors: Educational Technology, Technology Uses in Education, Information Storage, Information Management
Ilgaz, Hale; Mazma, Sacide Güzin; Altun, Arif – International Association for Development of the Information Society, 2014
In this study, the "Information Seeking Strategies" scale that was developed by Mills, Knezek and Wakefield (2013) has been adapted to Turkish language. A confirmatory factor analysis was run and subsequently, two items were removed. The fact that these two items are related to learning in a traditional class environment may be…
Descriptors: Information Seeking, Search Strategies, Turkish, Factor Analysis
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers