NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 21 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Livia Tomás; Ophélie Bidet – International Journal of Social Research Methodology, 2024
Qualitative research has been strongly affected by the COVID-19 pandemic, highlighting the possibilities that Voice over Internet Protocol (VoIP) technologies such as Skype, WhatsApp, and Zoom offer to qualitative scholars. Based on the experience of using such technologies to collect qualitative data for our PhD studies, we present how we dealt…
Descriptors: Telecommunications, Qualitative Research, Interviews, Interpersonal Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Meng Qu – Education and Information Technologies, 2024
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze visitor patterns in academic libraries. The PCA system offers real-time crowding information to the public and a comprehensive visitor analysis dashboard for library administrators. The system's…
Descriptors: Academic Libraries, Users (Information), Use Studies, Space Utilization
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Corn, Jenifer O.; Oliver, Kevin M.; Hess, Clara E.; Halstead, Elizabeth O.; Argueta, Rodolfo; Patel, Ruchi K.; Tingen, Jennifer; Huff, Jessica D. – Educational Technology, 2010
Twelve high schools in North Carolina piloted a 1:1 learning initiative, where every student and teacher received a laptop computer with wireless Internet access provided throughout the school. The overall goals of the initiative were to improve teaching practices; increase student achievement; and better prepare students for work, citizenship,…
Descriptors: High Schools, Focus Groups, Student Surveys, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Knipp, Peter A. – Physics Teacher, 2009
Students learn about physical laws and the scientific method when they analyze experimental data in a laboratory setting. Three common sources exist for the experimental data that they analyze: (1) "hands-on" measurements by the students themselves, (2) electronic transfer (by downloading a spreadsheet, video, or computer-aided data-acquisition…
Descriptors: Scientific Methodology, Physics, Scientific Principles, Science Experiments
Peer reviewed Peer reviewed
Direct linkDirect link
Kracke, Nancy – Journal of School Public Relations, 2009
It is tempting to assume that we know what our parents, our community, and our employees want from our schools. It is comforting to think that we know what they support. It is also dangerous. This article encourages school systems to let go of assumptions and to start asking the important questions that will lead school boards and administrators…
Descriptors: Central Office Administrators, School Districts, Information Sources, Stakeholders
Peer reviewed Peer reviewed
Fahmi, Ismail – International Information & Library Review, 2002
Describes the Indonesian Digital Library Network that is designed to develop Indonesia as a knowledge-based society. Highlights include the digital divide; problems in a developing country, including Internet accessibility, bandwidth capacity, and network delays; gathering information about national assets; information infrastructure; data…
Descriptors: Computer Networks, Data Collection, Developing Nations, Electronic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Giordano, Alberto; Lu, Yongmei; Anderson, Sharolyn; Fonstad, Mark – Journal of Geography, 2007
The purpose of this article is to describe a capstone course in undergraduate student geographical research in which GIS and other geospatial tools were used to teach undergraduate students basic geographical principles. The course uses the "cooperative learning" pedagogical approach to address one of a number of client-supplied research projects,…
Descriptors: Curriculum, Undergraduate Students, Geography Instruction, Student Research
Peer reviewed Peer reviewed
McClure, Charles R. – Library Trends, 1994
Provides an overview of the importance of user-based evaluations of networked information services; reviews data collection techniques that provide a user perspective when assessing networked information services, including focus groups, user logs, interviews, observation, and surveys; and offers practical suggestions and guidelines for using such…
Descriptors: Computer Networks, Data Collection, Evaluation Methods, Focus Groups
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Lynch, Clifford – CAUSE/EFFECT, 1998
Describes access management problems associated with networked information systems and the two major architectural approaches used to address them, including discussion of related policy issues such as privacy, accountability, and collection of management data. Focus is on the concerns of colleges and universities and on developing practical…
Descriptors: Access to Information, Accountability, Administrative Policy, College Administration
Kapisovsky, Peggy M. – Media and Methods, 1990
Discussion of science and math instruction for elementary and secondary students highlights the use of microcomputer-based laboratories (MBL). Data collection, storage, and display are discussed, the use of databases to organize and manage information is described, and the exchange of ideas with other students through telecommunications is…
Descriptors: Computer Assisted Instruction, Computer Networks, Data Analysis, Data Collection
Peer reviewed Peer reviewed
Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)
Previous Page | Next Page »
Pages: 1  |  2