Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Author
Beck, Jules K. | 1 |
Biggs, Bobbie T. | 1 |
Carroll, Norine | 1 |
Jamalian, Azadeh | 1 |
Kim, Philip | 1 |
Lin, Qiuyun | 1 |
Richardson, Shenetta | 1 |
Sossi, Dino | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Adult Education | 1 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 3 | 1 |
Primary Education | 1 |
Audience
Location
Arkansas | 1 |
New York (New York) | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Carroll, Norine – ProQuest LLC, 2017
By the year 2025, 75% of the workforce will consist of Generation Y (Kim, 2017). With the major shift in the workforce, organizations must consider the different learning styles and expectations of the Y generation, as compared to the previous, dominant generations (Tulgan, 2009). In order to determine if there is a difference in short-term and…
Descriptors: Retention (Psychology), Generational Differences, Pretests Posttests, Computer Assisted Instruction
Sossi, Dino; Jamalian, Azadeh; Richardson, Shenetta – Journal of Mathematics Education at Teachers College, 2011
This exploratory study compared a computer-based mathematics education intervention with two more traditional approaches with the purpose of improving instruction in perimeter and area. Kidspiration software, tile/stick manipulatives and pencil/paper-based copying/drawing of shapes were implemented in a 3rd Grade New York City public school…
Descriptors: Intervention, Mathematics Education, Computer Managed Instruction, Conventional Instruction
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security
Beck, Jules K.; Biggs, Bobbie T. – Online Submission, 2008
This research investigates the life, work, and education of students in Human Resource Development (HRD) Cohort Ten, a distance learning program for non-traditional undergraduate students in Arkansas. The study has identified commonalties in perceptions regarding accessibility, sense of achievement, and other themes related to the program. The…
Descriptors: Undergraduate Students, Distance Education, Rural Areas, Human Resources
Lin, Qiuyun – Internet and Higher Education, 2008
Mixed or hybrid method has become an increasingly popular course delivery model in recent years, but research regarding the effect of mixed learning is limited because of its recent debut in the landscape of educational technology. This one-year exploratory study looked at 78 elementary teacher candidates' view of learning in four mixed courses…
Descriptors: Computer Software, Computer Managed Instruction, Instructional Design, Educational Technology