Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Systems Approach | 3 |
| Video Technology | 3 |
| Social Networks | 2 |
| Technology Uses in Education | 2 |
| Academic Standards | 1 |
| Access to Education | 1 |
| Alumni | 1 |
| Barriers | 1 |
| Best Practices | 1 |
| Campuses | 1 |
| Change Strategies | 1 |
| More ▼ | |
Publication Type
| Reports - Descriptive | 3 |
| Journal Articles | 2 |
Education Level
| Higher Education | 2 |
| Elementary Secondary Education | 1 |
Audience
Location
| Massachusetts | 1 |
| Minnesota | 1 |
| New Jersey | 1 |
| Oregon | 1 |
| Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Killion, Joellen – Learning Forward, 2013
More stakeholders are turning to technology to advance the professional learning required to support new standards and evaluation systems. Yet how technology is used will determine its potential to influence educator practice and results for students. This brief outlines how technology can enhance professional learning, offers examples of how…
Descriptors: Academic Standards, Technology Integration, Technology Uses in Education, Stakeholders
Fernandez, Kim – CURRENTS, 2010
Most colleges and universities that launch into social media do so by dipping one toe in the water rather than swan diving into the deep end. And while many people define "social media" as Facebook and perhaps Twitter, the term actually encompasses everything from blogs to photo- and video-sharing sites to LinkedIn to any of dozens of…
Descriptors: Institutional Advancement, Social Networks, Internet, Web Sites
Starkman, Neal – Campus Technology, 2007
As schools adopt new and varied technologies to protect the campus community, the need to look at security tools in terms of a comprehensive, layered, and integrated strategy, becomes clear. This article discusses how schools are using these security tools.
Descriptors: Campuses, School Security, Systems Approach, Electronic Mail

Direct link
