Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 24 |
Since 2016 (last 10 years) | 80 |
Since 2006 (last 20 years) | 178 |
Descriptor
Information Management | 254 |
Information Storage | 248 |
Internet | 89 |
Information Technology | 86 |
Computer Software | 66 |
Educational Technology | 55 |
Foreign Countries | 55 |
Access to Information | 52 |
Technology Uses in Education | 52 |
Archives | 43 |
Higher Education | 42 |
More ▼ |
Source
Author
Johnson, L. | 7 |
Adams Becker, S. | 4 |
Freeman, A. | 4 |
Cummins, M. | 3 |
Adams, S. | 2 |
Bishop, Bradley Wade | 2 |
El Mhouti, Abderrahim | 2 |
Erradi, Mohamed | 2 |
Estrada, V. | 2 |
Abdekhoda, Mohammadhiwa | 1 |
Abebe, Getachew Gedamu | 1 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 9 |
Policymakers | 7 |
Administrators | 5 |
Teachers | 4 |
Media Staff | 3 |
Researchers | 2 |
Students | 2 |
Parents | 1 |
Location
Australia | 10 |
Canada | 5 |
India | 5 |
Ohio | 5 |
California | 4 |
New Zealand | 4 |
Turkey | 4 |
United Kingdom | 4 |
United States | 4 |
Connecticut | 3 |
Malaysia | 3 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Education Consolidation… | 1 |
Fair Labor Standards Act | 1 |
Freedom of Information Act | 1 |
No Child Left Behind Act 2001 | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Martha, VenkataSwamy – ProQuest LLC, 2013
Networks, such as social networks, are a universal solution for modeling complex problems in real time, especially in the Big Data community. While previous studies have attempted to enhance network processing algorithms, none have paved a path for the development of a persistent storage system. The proposed solution, GraphStore, provides an…
Descriptors: Networks, Information Storage, Graphs, Statistical Data
Aldukheil, Maher A. – ProQuest LLC, 2013
The Healthcare industry is characterized by its complexity in delivering care to the patients. Accordingly, healthcare organizations adopt and implement Information Technology (IT) solutions to manage complexity, improve quality of care, and transform to a fully integrated and digitized environment. Electronic Medical Records (EMR), which is…
Descriptors: Information Technology, Records (Forms), Medical Evaluation, Electronic Publishing
Aburezeq, Ibtehal Mahmoud; Dweikat, Fawzi Fayez Ishtaiwa – International Journal of Distance Education Technologies, 2017
This study examined pre-service teachers' expertise, perceptions and integration of cloud applications in teaching of Arabic and English. Questionnaires and semi-structured interviews were used as data collection methods. The findings of the study specified that pre-service teachers did not own sufficient expertise for effective integration of…
Descriptors: Preservice Teachers, Student Attitudes, Second Language Instruction, Semitic Languages
Priddle, Charlotte; McCann, Laura – College & Research Libraries, 2015
Special collections libraries collect and preserve materials of intellectual and cultural heritage, providing access to unique research resources. As their holdings continue to expand, special collections in research libraries confront increased space pressures. Off-site storage facilities, used frequently by research libraries for general…
Descriptors: Cultural Background, Archives, Library Materials, Library Development
Ramachandran, N.; Sivaprakasam, P.; Thangamani, G.; Anand, G. – Campus-Wide Information Systems, 2014
Purpose: Cloud Computing (CC) technology is getting implemented rapidly in the educational sector to improve learning, research and other administrative process. As evident from the literature review, most of these implementations are happening in the western countries such as USA, UK, while the level of implementation of CC in developing…
Descriptors: Internet, Computer Software, Information Management, Information Storage
Blair, Douglas; Dawson, Barbara E.; Fary, Michael; Hillegas, Curtis W.; Hopkins, Brian W.; Lyons, Yolanda; McCullough, Heather; McMullen, Donald F.; Owen, Kim; Ratliff, Mark; Williams, Harry – EDUCAUSE, 2014
The EDUCAUSE Center for Analysis and Research Data Management Working Group (ECAR-DM) has created a framework for research data storage as an aid for higher education institutions establishing and evaluating their institution's research data storage efforts. This paper describes areas for consideration and suggests graduated criteria to assist in…
Descriptors: Information Storage, Research Reports, Success, Higher Education
Castillo, Alan F. – ProQuest LLC, 2014
The purpose of this quantitative correlational cross-sectional research study was to examine a theoretical model consisting of leadership practice, attitudes of business process outsourcing, and strategic intentions of leaders to use cloud computing and to examine the relationships between each of the variables respectively. This study…
Descriptors: Leadership Styles, Leadership, Intention, Internet
Xiao, Jun; Wang, Minjuan; Wang, Lamei; Zhu, Xiaoxiao – International Journal of Distance Education Technologies, 2013
The gradual development of intelligent learning (iLearning) systems has prompted the changes of teaching and learning. This paper presents the architecture of an intelligent learning (iLearning) system built upon the recursive iLearning model and the key technologies associated with this model. Based on this model and the technical structure of a…
Descriptors: Educational Technology, Teaching Methods, Intelligent Tutoring Systems, Continuing Education
Ozcan, Seher; Gokcearslan, Sahin; Kukul, Volkan – Online Submission, 2015
Pre-service teachers are expected to use new technologies such as Google+ which facilitates contacting, sharing in certain environments and working collaboratively with the help of cloud support in their lessons effectively. This study aims to examine pre-service teachers' opinions regarding the use of Google+ to support lesson activities. In this…
Descriptors: Preservice Teachers, Student Attitudes, Semi Structured Interviews, Educational Technology
McNeal, McKenzie, III. – ProQuest LLC, 2012
Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…
Descriptors: Computer Mediated Communication, Information Security, Computer Security, Communications
National Forum on Education Statistics, 2015
When properly employed, technology may enhance and support learning opportunities available to any student, at any location, and at any time. Determining which instructional and delivery methods are best for a specific individual, group of students, community, or circumstance demands that high-quality data be available to students, parents,…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Data Collection
Grajek, Susan – EDUCAUSE, 2016
EDUCAUSE is in its second year of identifying the influence of major trends on the IT strategy of colleges and universities. This year's Trend Watch list included 29 trends in the management and delivery of IT services, personal devices and personalized environments, data and analytics, teaching and learning, security and risk, and the Internet of…
Descriptors: Educational Trends, Trend Analysis, Information Technology, Higher Education
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Toe, Cleophas Adeodat – ProQuest LLC, 2013
Data security breaches are categorized as loss of information that is entrusted in an organization by its customers, partners, shareholders, and stakeholders. Data breaches are significant risk factors for companies that store, process, and transmit sensitive personal information. Sensitive information is defined as confidential or proprietary…
Descriptors: Information Security, Costs, Corporations, Information Management
Paquet, Katherine G. – ProQuest LLC, 2013
Cloud computing may provide cost benefits for organizations by eliminating the overhead costs of software, hardware, and maintenance (e.g., license renewals, upgrading software, servers and their physical storage space, administration along with funding a large IT department). In addition to the promised savings, the organization may require…
Descriptors: Internet, Computer Software, Computers, Information Technology