Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Education | 3 |
Grade 3 | 3 |
Early Childhood Education | 2 |
Grade 4 | 2 |
Primary Education | 2 |
Elementary Secondary Education | 1 |
Grade 12 | 1 |
Grade 2 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Grade 7 | 1 |
More ▼ |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mirna Isabel Rivera García – International Society for Technology, Education, and Science, 2024
This study proposes a local theory called "Inside-Outside" to strengthen a deprived school microsystem. The theory aims to reduce the cycle of ignorance in schools with poor infrastructure facilities, large groups of students, located in high-crime areas, children from low-income families with low levels of schooling, and families unable…
Descriptors: Systems Approach, Disadvantaged Schools, Crime, Community Characteristics
Lock, Jennifer; Duggleby, Sandra – Technology, Pedagogy and Education, 2018
In today's classrooms, learning does not have to be bounded by physical space. By having access to a range of digital communication technologies, students and teachers can synchronously and asynchronously engage in authentic learning opportunities extending beyond the local community. They can be learning and interacting with others from around…
Descriptors: Quality of Life, International Cooperation, Information Technology, Cooperative Learning
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics