Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 8 |
Descriptor
Check Lists | 15 |
Information Technology | 15 |
Educational Technology | 8 |
Access to Information | 4 |
Computer Software | 4 |
Educational Policy | 4 |
Guidelines | 4 |
Certification | 3 |
Computer Networks | 3 |
Computer Security | 3 |
Copyrights | 3 |
More ▼ |
Source
Author
Agee, Kelly, Ed. | 2 |
Abdous, M'hammed | 1 |
Beer, Robert | 1 |
Brun-Mercer, Nicole | 1 |
Crews, Kenneth D. | 1 |
Dark, Melissa | 1 |
DeLucia, Jodi | 1 |
Gillis, R. Peter | 1 |
Hughes, Joy R. | 1 |
Klingler, Tom | 1 |
Lunin, Lois F. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 15 |
Journal Articles | 11 |
Guides - Non-Classroom | 2 |
Tests/Questionnaires | 2 |
Books | 1 |
Guides - General | 1 |
Education Level
Elementary Secondary Education | 3 |
Higher Education | 3 |
Secondary Education | 2 |
Postsecondary Education | 1 |
Audience
Practitioners | 1 |
Location
Mississippi | 2 |
Canada | 1 |
Laws, Policies, & Programs
Carl D Perkins Vocational and… | 2 |
No Child Left Behind Act 2001 | 2 |
Copyright Law 1976 | 1 |
Digital Millennium Copyright… | 1 |
Technology Education and… | 1 |
Assessments and Surveys
ACT Assessment | 2 |
What Works Clearinghouse Rating
Brun-Mercer, Nicole – English Teaching Forum, 2019
Literacy today requires not only the comprehension of traditional print texts, but also proficiency in twenty-first century technology (International Reading Association 2009). While reading online has become commonplace and in many instances mandatory, readers are not necessarily engaging with digital texts effectively or efficiently. Instructors…
Descriptors: Reading Strategies, Reading Comprehension, Reading Processes, Reading Rate
Seo, JooYoung; Richard, Gabriela T. – Information and Learning Sciences, 2021
Purpose: In response to the underexplored need for holistically inclusive makerspaces for learning, we put propose the "SCAFFOLD" framework, which considers equity, inclusion and accessibility in the design of spaces and activities for socioculturally diverse learners. Design/methodology/approach: This paper proposes a universal design…
Descriptors: Inclusion, Creative Activities, Guidelines, Student Diversity
Radovan, Marko; Perdih, Mojca – International Review of Research in Open and Distributed Learning, 2016
E-learning is a rapidly developing form of education. One of the key characteristics of e-learning is flexibility, which enables easier access to knowledge for everyone. Information and communications technology (ICT), which is e-learning's main component, enables alternative means of accessing the web-based learning materials that comprise the…
Descriptors: Guidelines, Internet, Instructional Materials, Instructional Material Evaluation
Crews, Kenneth D. – ALA Editions, 2012
Copyright in the world of digital information is changing at a fevered pace, even as educators and librarians digitize, upload, download, draw on databases, and incorporate materials into Web-based instruction. It's essential to stay abreast of the basics of copyright law and fair use. Kenneth D. Crews has completely revised his classic text to…
Descriptors: Copyrights, Web Based Instruction, Library Services, Librarians
Abdous, M'hammed – Quality Assurance in Education: An International Perspective, 2009
Purpose: The purpose of this paper is to propose a process-oriented lifecycle model for ensuring quality in e-learning development and delivery. As a dynamic and iterative process, quality assurance (QA) is intertwined with the e-learning development process. Design/methodology/approach: After reviewing the existing literature, particularly…
Descriptors: Instructional Design, Quality Control, Information Systems, Electronic Learning
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Agee, Kelly, Ed. – Research and Curriculum Unit, 2009
Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…
Descriptors: Animation, Multimedia Materials, Information Technology, Graphic Arts
Agee, Kelly, Ed. – Research and Curriculum Unit, 2009
Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…
Descriptors: Information Technology, Educational Technology, Teaching Methods, Computer Science Education
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Parsons, Catherine; DeLucia, Jodi – Technology & Learning, 2005
In the age of data-driven decision making, collecting data and using it efficiently is key to all aspects of the education process. Online surveys are a great way to gather information on everything from lunchroom procedures to program design. This information can impact solutions for student achievement, community relations, and district…
Descriptors: Program Design, Check Lists, Management Information Systems, Computer Oriented Programs
Lunin, Lois F.; And Others – Bulletin of the American Society for Information Science, 1992
The three articles in this special section on document image files discuss intelligent character recognition, including comparison with optical character recognition; selection of displays for document image processing, focusing on paperlike displays; and imaging hardware, software, and vendors, including guidelines for system selection. (MES)
Descriptors: Character Recognition, Check Lists, Comparative Analysis, Computer Peripherals
Ringle, Martin – Library Hi Tech News, 1996
Presents a checklist of 10 strategic technology issues for liberal arts colleges based on a 1995 Educom workshop. Highlights include evaluating technology investments; use of the World Wide Web; electronic communication; faculty use of technology; consortia; campuswide policies; copyright and licensing issues; ownership issues; and planning and…
Descriptors: Budgeting, Check Lists, Colleges, Consortia

Klingler, Tom – Journal of Library Administration, 1999
Provides a checklist of concerns for libraries planning to implement shared research databases in a consortium environment, based on experiences at OhioLINK. Highlights include database selection criteria, licensing, pricing, funding, vendor considerations, database profiling, custom data processing, hardware selection, database access,…
Descriptors: Access to Information, Check Lists, Computer Selection, Computer Software
Waterhouse, Shirley; Rogers, Rodney O. – EDUCAUSE Quarterly, 2004
Most professionals interested in the use of technology in education understand the importance of an e-learning course site, whether the course is taught totally online or in a hybrid environment where the instructor has some face-to-face contact with students. However, many instructors have not thoroughly considered the importance of posting…
Descriptors: Copyrights, Online Courses, Privacy, Educational Technology
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education