Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Electronic Journal of… | 1 |
Author
Crichton, Susan | 1 |
Dussome, Webb | 1 |
Heck, Gary J. | 1 |
Pegler, Karen | 1 |
Rozmahel, Kathleen | 1 |
Wallace, Barbara | 1 |
White, Duncan | 1 |
Publication Type
Reports - Research | 2 |
Information Analyses | 1 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Education Level
Adult Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Practitioners | 3 |
Administrators | 1 |
Media Staff | 1 |
Location
Canada | 4 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Crichton, Susan; Pegler, Karen; White, Duncan – Electronic Journal of e-Learning, 2012
Our paper reports findings from a two-phase deployment of iPod Touch and iPad devices in a large, urban Canadian school board. The purpose of the study was to gain an understanding of the infrastructure required to support handheld devices in classrooms; the opportunities and challenges teachers face as they begin to use handheld devices for…
Descriptors: Foreign Countries, Familiarity, High School Students, Teaching Methods
Dussome, Webb; Rozmahel, Kathleen – 1999
This study examined how technology funding is planned, deployed and managed in six Alberta school jurisdictions and identified best practices and recommended strategies. Specific objectives were to research and examine, via interviews with technology personnel in each jurisdiction, the funding frameworks in place, and to report on commonalties,…
Descriptors: Centralization, Computer Networks, Computer Uses in Education, Decentralization
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software
Heck, Gary J.; Wallace, Barbara – 1999
The successful implementation of Alberta's learner outcomes in information and communication technology will depend on the ability of educators across the province to understand how change occurs and what change means for those who are involved. Schools and school jurisdictions also must have a clear vision for the future and provide effective…
Descriptors: Computer Uses in Education, Curriculum Development, Educational Administration, Educational Change