NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)2
Since 2006 (last 20 years)6
Audience
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Suwanroj, Thamasan; Leekitchwatana, Punnee; Pimdee, Paitoon – Journal of Technology and Science Education, 2019
The purpose of this descriptive study was to apply 2nd order confirmatory factor analysis (CFA) and structural relationship models to identify the digital competency components essential to undergraduate students in Thai higher education institutions. The sample comprised 1,126 specialists in Information Technology, Computer Technology, Computer…
Descriptors: Technological Literacy, Undergraduate Students, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Carley, Maureen; Babb, Jeffry – Information Systems Education Journal, 2015
The digital revolution is upon us, bringing with it disruptive forces in every aspect of business and personal interactions. The business marketing function has become so technologically driven it is sometimes hard to tell where the boundaries between the Marketing and Information Systems disciplines lie. The new world of digital marketing has…
Descriptors: Marketing, Information Systems, Interdisciplinary Approach, Information Technology
Chan, Pat P. W. – International Association for Development of the Information Society, 2014
With the advancement of information and communication technology, collaboration and knowledge sharing through technology is facilitated which enhances the learning process and improves the learning efficiency. The purpose of this paper is to review the methods of assessment and strategy of collaboration and knowledge sharing in a computer course,…
Descriptors: Information Technology, Access to Information, Technology Uses in Education, Evaluation Methods
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers