Publication Date
In 2025 | 5 |
Since 2024 | 162 |
Since 2021 (last 5 years) | 591 |
Since 2016 (last 10 years) | 1568 |
Since 2006 (last 20 years) | 4102 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 758 |
Administrators | 397 |
Researchers | 246 |
Teachers | 240 |
Policymakers | 190 |
Media Staff | 119 |
Students | 59 |
Counselors | 29 |
Community | 11 |
Parents | 11 |
Support Staff | 8 |
More ▼ |
Location
California | 203 |
Canada | 184 |
United States | 163 |
Australia | 159 |
United Kingdom | 136 |
Texas | 126 |
New York | 107 |
Florida | 85 |
Illinois | 84 |
Pennsylvania | 81 |
Ohio | 76 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards without Reservations | 3 |
Meets WWC Standards with or without Reservations | 3 |
Elayeb, Bilel; Evrard, Fabrice; Zaghdoud, Montaceur; Ahmed, Mohamed Ben – Interactive Technology and Smart Education, 2009
Purpose: The purpose of this paper is to make a scientific contribution to web information retrieval (IR). Design/methodology/approach: A multiagent system for web IR is proposed based on new technologies: Hierarchical Small-Worlds (HSW) and Possibilistic Networks (PN). This system is based on a possibilistic qualitative approach which extends the…
Descriptors: Information Retrieval, Models, College Students, Internet
McLuckie, Joseph A.; Naulty, Michael; Luchoomun, Dharmadeo; Wahl, Harald – Industry and Higher Education, 2009
This article explores the transition in course delivery from a paper-based format to blended learning, and highlights the role of the virtual learning environment (VLE) in this process. Professional practice in postgraduate programmes in particular is investigated during this transition stage at the University of Dundee (UoD) in Scotland, and the…
Descriptors: Electronic Learning, Constructivism (Learning), Information Systems, Foreign Countries
The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex
Greenberg, David F.; Roush, Jeffrey B. – Evaluation Review, 2009
Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…
Descriptors: Crime, Crime Prevention, Public Housing, Program Effectiveness
Konshak, Peter – Computers in the Schools, 2009
Text messaging is an ideal communications method for libraries, which often want to send short, concise messages to their patrons near and far. Uses for text messaging in libraries include reminders about items' due dates, hold pickup notices, program reminders, and even short messages of content. Some libraries are already using text messaging…
Descriptors: Computers, Public Libraries, Computer Uses in Education, Users (Information)
Lawler, James P.; Joseph, Anthony – Information Systems Education Journal, 2010
Digital gaming continues to be an approach for enhancing methods of pedagogy. The study evaluates the effectiveness of a gaming product of a leading technology firm in engaging graduate students in an information systems course at a major northeast institution. Findings from a detailed perception survey of the students indicate favorable…
Descriptors: Computer Games, Simulated Environment, Teaching Methods, Graduate Students
Hoffman, Jennifer Kate – ProQuest LLC, 2010
This dissertation has two areas of focus: learning and developmental disorders (LDDs) and polyfluoroalkyl chemicals (PFCs). Epidemiological and exposure assessment methods are applied to each. The first paper used geographic location as a surrogate for exposure and broadly assesses the effect of the environment, both physical and social, on LDD…
Descriptors: Geographic Information Systems, Attention Deficit Hyperactivity Disorder, Water, Epidemiology
Khatib, Eid – ProQuest LLC, 2010
In spite of enormous investment and remarkable advancement in information system technology (IST) corporations, human integration remains the dominant factor in their success. While 10% of the failure can be attributed to technique failures, 90% are due to human issues. The purpose of this qualitative phenomenological study was to capture the…
Descriptors: Information Systems, Corporations, Phenomenology, Employees
Francisco, James R. – ProQuest LLC, 2010
Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like…
Descriptors: Nurses, Federal Legislation, Nursing, Information Systems
Prew, Martin; Quaigrain, Kenneth – Educational Management Administration & Leadership, 2010
This article looks at a school management tool that allows school managers and education district offices to review the performance of their schools and use the broad-based data to undertake orchestrated planning with districts planning delivery based on the needs of schools and in support of school improvement plans. The review process also…
Descriptors: School Effectiveness, Educational Change, Foreign Countries, Accountability
Schwartz, Celeste; Barron, Mary Lou; Mauger, Alana J. – EDUCAUSE Quarterly, 2010
Data-informed decision making helps higher education institutions know whether they are achieving their missions, including expanding access to higher education and increasing student success. For three consecutive years, Montgomery County Community College (MCCC) has been ranked among the top community colleges in the country for its use of…
Descriptors: Community Colleges, Student Experience, Technology Uses in Education, School Holding Power
Whisenand, Thomas G.; Dunphy, Steven M. – Journal of Information Systems Education, 2010
The authors suggest using an alternative teaching methodology to impart knowledge regarding information systems phraseology and vocabulary. Specifically, a series of crossword puzzles or scrabbles are used to present information system (IS) terminology to students in an introductory business information systems course. The puzzle terms and answers…
Descriptors: Feedback (Response), Vocabulary Development, Introductory Courses, Educational Games
Jarrahi, Mohammad Hossein – Behaviour & Information Technology, 2010
An understanding of the role of e-learning needs to be accompanied by a realisation of the variety of social dimensions in the innovation process. As most studies in this domain are typically context-independent, this research, building on structuration theory, seeks to investigate different interpretations and uses of course management systems…
Descriptors: Innovation, Electronic Learning, Information Systems, Educational Technology
Elias, Tanya – International Review of Research in Open and Distance Learning, 2010
This paper identifies a set of universal instructional design (UID) principles appropriate to distance education (DE) and specifically tailored to the needs of instructional designers and instructors teaching online. These principles are then used to assess the accessibility level of a sample online course and the availability of options in its…
Descriptors: Instructional Design, Distance Education, Online Courses, Teaching Methods
DiBiase, David; Kidwai, Khusro – Journal of Geography in Higher Education, 2010
This study investigates the counter-intuitive observation that older students tend to thrive better than younger students in online classes. We use a variety of measures to compare performance and attitudes of undergraduates and continuing adult professionals in separate but nearly identical class sections led by the same instructor at a US…
Descriptors: Student Attitudes, Program Effectiveness, Online Courses, Older Adults
Sexton, Will – Computers in Libraries, 2010
That little rectangle with a button next to it? (Those things called search boxes but might just as well be called "resource drains.") Imagine it disappearing from a library's webpages. The intricate works behind these design elements make up a major portion of what library staff spends time and money developing, populating, supporting,…
Descriptors: Library Personnel, Library Automation, Library Development, Library Services