Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 13 |
Since 2006 (last 20 years) | 50 |
Descriptor
Source
Author
Villano, Matt | 3 |
Singh, Anil | 2 |
Amorim, António | 1 |
Armenski, Goce | 1 |
Barton, Erin E. | 1 |
Baykoucheva, Svetla | 1 |
Becker, Bernd W. | 1 |
Bemposta-Rosende, Sergio | 1 |
Blair, Risa | 1 |
Boaventura, Edivaldo | 1 |
Bock, Julia | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 57 |
Journal Articles | 52 |
Speeches/Meeting Papers | 2 |
Guides - Classroom - Teacher | 1 |
Tests/Questionnaires | 1 |
Translations | 1 |
Education Level
Higher Education | 33 |
Elementary Secondary Education | 11 |
Postsecondary Education | 10 |
High Schools | 2 |
Adult Education | 1 |
Elementary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Media Staff | 2 |
Policymakers | 1 |
Location
Maryland | 5 |
Florida | 2 |
Illinois | 2 |
United States | 2 |
Australia | 1 |
California | 1 |
Canada (Winnipeg) | 1 |
Georgia | 1 |
Germany | 1 |
Iowa | 1 |
Massachusetts | 1 |
More ▼ |
Laws, Policies, & Programs
Every Student Succeeds Act… | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
School Survey on Crime and… | 1 |
What Works Clearinghouse Rating
Christopher R. Vyhnal – Journal of Chemical Education, 2023
How do cultural heritage scientists and art conservators identify pigments and other painting media in a decorated object or painting, preferably without taking samples that could potentially damage the artwork? A major emphasis in the characterization, authentication, and conservation of works of art and cultural heritage objects is the use of…
Descriptors: Interdisciplinary Approach, Science Education, Archaeology, Art Education
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Jones, Oliver A. H.; Spencer, Michelle J. S. – Journal of Chemical Education, 2018
Using tangible models to help students visualize chemical structures in three dimensions has been a mainstay of chemistry education for many years. Conventional chemistry modeling kits are, however, limited in the types and accuracy of the molecules, bonds and structures they can be used to build. The recent development of 3D printing technology…
Descriptors: Computer Peripherals, Printing, Chemistry, Molecular Structure
Hartong, Sigrid – Critical Studies in Education, 2021
This contribution takes a critical perspective on digital school performance platforms (SPP), which today play a key role in US state education monitoring and accountability. Using examples from two different US state education agencies, I provide an analytical disentanglement of some key dimensions of such platforms' enactment and materiality. I…
Descriptors: State Departments of Education, Technology Uses in Education, Performance, Accountability
Shields, Julie – Communique, 2018
While working in the Social and Emotional Support Services (SESS) for Montgomery County Public Schools in Maryland (MCPS), the author initiated a project to collect data on services to students with emotional needs. During the 2016-2017 school year, MCPS was the 17th largest school district in the country with nearly 160,000 students speaking 150…
Descriptors: Technology Uses in Education, Program Administration, Database Management Systems, Psychological Needs
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Matta, Alfredo; Silva, Francisca De Paula Da; Amorim, António; Boaventura, Edivaldo – Asian Journal of Distance Education, 2018
Based on the 15 years long analysis on the investigation about the relationship between Research and Knowledge in History and the Development of Digital Technology for the teaching and research in this knowledge area, comes up an interpretation of the new contributions that the digital technologies are bringing for the knowledge in History, from…
Descriptors: Educational Technology, Technology Uses in Education, History Instruction, Knowledge Level
National Institute of Justice, 2020
The Comprehensive School Safety Initiative (CSSI) is a large-scale, integrated research effort designed to increase the safety of schools nationwide. It was initiated in 2014 at the request of Congress. The National Institute of Justice (NIJ) administers the CSSI as a research grant program. Through the CSSI, the NIJ funds research-focused…
Descriptors: School Safety, School Violence, Prevention, Best Practices
Gaston, Paul L. – Change: The Magazine of Higher Learning, 2017
For decades, academia has been hampered by what appears to be preference for opacity and obfuscation. In an article published in this magazine three years ago, "The Vocabularies of Higher Education" (Gaston, 2014), the author lamented the welter of terms and acronyms that has accumulated over many decades, particularly within the current…
Descriptors: Higher Education, Search Engines, Information Systems, Access to Information
Gusev, Marjan; Ristov, Sasko; Armenski, Goce – International Journal of Distance Education Technologies, 2016
Recent technology trends evolved the student assessment from traditional ones ("pen-and-paper" and "face-to-face") to modern e-Assessment system. These modern approaches allow the teachers to conduct and evaluate an exam with huge number of students in a short period of time. Even more important, both the teacher and the…
Descriptors: Educational Technology, Technology Uses in Education, Computer Assisted Testing, Evaluation Methods
Ha¨rtinger, Stefan; Clarke, Nigel – Journal of Chemical Education, 2016
Developing skills for searching the patent literature is an essential element of chemical information literacy programs at the university level. The present article creates awareness of patents as a rich source of chemical information. Patent classification is introduced as a key-component in comprehensive search strategies. The free Espacenet…
Descriptors: Science Instruction, Chemistry, Intellectual Property, Classification
Miller, Cynthia L. – Journal of Family and Consumer Sciences, 2015
The primary purpose of this paper is to explain how a digital tool, "LiveBinder," can be used for organizing online content and learning. The article explains why this digital tool should be utilized as a teaching resource and describes common uses. It also addresses how LiveBinders can be organized using shelves. A model LiveBinder of…
Descriptors: Consumer Science, Courseware, Electronic Learning, Multimedia Materials
Magdin, Martin – Turkish Online Journal of Educational Technology - TOJET, 2016
In the last decade, e-learning has been a standard part of the educational process at all types of schools--primary, secondary, and high schools. When used, e-learning can achieve significant savings not only in terms of time as well as operating costs. However, e-learning is also often criticized. This is mainly due to direct absence of teachers…
Descriptors: Electronic Learning, Notetaking, Courseware, Usability
Letkowski, Jerzy – Journal of Instructional Pedagogies, 2014
Design, development and explorations of databases are popular topics covered in introductory courses taught at business schools. Microsoft Access is the most popular software used in those courses. Despite quite high complexity of Access, it is considered to be one of the most friendly database programs for beginners. A typical Access textbook…
Descriptors: Computer Software, Technology Uses in Education, Business Administration Education, Educational Technology
Baykoucheva, Svetla; Houck, Joseph D.; White, Natalia – Journal of Chemical Education, 2016
The blended model for information literacy instruction described in this article introduces students not only to efficient techniques for finding scientific literature and properties of chemical compounds, but also to managing this information with a bibliographic management program (EndNote Online). The model blends face-to-face instruction with…
Descriptors: Information Literacy, Science Instruction, Chemistry, Models