Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Sherrell, Linda; Krishna, Bhagavathy; Velaga, Natasha; Vejandla, Pavan; Satharla, Mahesh – Journal of Computers in Mathematics and Science Teaching, 2010
Agile methodologies have become increasingly popular among software developers as evidenced by industrial participation at related conferences. The popularity of agile practices over traditional techniques partly stems from the fact that these practices provide for more customer involvement and better accommodate rapidly changing requirements,…
Descriptors: Computer Software, Methods, Independent Study, Graduate Students
Mitchell, Erik T. – Journal of Web Librarianship, 2010
One of the first big shifts in how libraries manage resources was the move from print-journal purchasing models to database-subscription and electronic-journal purchasing models. Libraries found that this transition helped them scale their resources and provide better service just by thinking a bit differently about their services. Likewise,…
Descriptors: Libraries, Library Materials, Electronic Publishing, Electronic Libraries
Chen, Chia-Chen; Huang, Tien-Chi – Computers & Education, 2012
Context-awareness techniques can support learners in learning without time or location constraints by using mobile devices and associated learning activities in a real learning environment. Enrichment of context-aware technologies has enabled students to learn in an environment that integrates learning resources from both the real world and the…
Descriptors: Learning Strategies, Museums, Foreign Countries, Educational Environment
Meyer, Lars – Association of Research Libraries, 2009
Preservation has long been considered a fundamental responsibility of research libraries. Data on preservation activities by its members has been collected by the Association of Research Libraries (ARL) since 1987, but changing digital technologies and the research, teaching, and learning environments in which research libraries are engaged…
Descriptors: Research Libraries, Responsibility, Preservation, Institutional Mission
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Judge, Miriam – Irish Educational Studies, 2013
This article discusses the research findings from the start-up phase of an innovative information and communication technology (ICT) project focused on ICT integration as a complex process involving many factors such as leadership, school readiness and organisational culture. Known locally as Hermes, the project's core objective was to provide an…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Leadership
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Larney, Sarah; Burns, Lucy – Evaluation Review, 2011
Individuals in contact with the criminal justice system are a key population of concern to public health. Record linkage studies can be useful for studying health outcomes for this group, but the use of aliases complicates the process of linking records across databases. This study was undertaken to determine the impact of aliases on sensitivity…
Descriptors: Criminals, Public Health, Justice, Institutionalized Persons
Eisenberg, Mike – Library Journal, 2008
The Web 2.0 "buzz" starts with new technologies such as virtual worlds, cell phones and handheld devices that offer 24/7 web access, tagging, social networks, and blogs and brings together various web capabilities in unique combinations. Web 2.0, however, is about much more than the technology--it is about a change in focus to participation, user…
Descriptors: Information Science Education, Information Needs, Libraries, Information Science
Rupp, Andre A.; Levy, Roy; Dicerbo, Kristen E.; Sweet, Shauna J.; Crawford, Aaron V.; Calico, Tiago; Benson, Martin; Fay, Derek; Kunze, Katie L.; Mislevy, Robert J.; Behrens, John T. – Journal of Educational Data Mining, 2012
In this paper we describe the development and refinement of "evidence rules" and "measurement models" within the "evidence model" of the "evidence-centered design" (ECD) framework in the context of the "Packet Tracer" digital learning environment of the "Cisco Networking Academy." Using…
Descriptors: Computer Networks, Evidence Based Practice, Design, Instructional Design
Mislevy, Robert J.; Behrens, John T.; Dicerbo, Kristen E.; Levy, Roy – Journal of Educational Data Mining, 2012
"Evidence-centered design" (ECD) is a comprehensive framework for describing the conceptual, computational and inferential elements of educational assessment. It emphasizes the importance of articulating inferences one wants to make and the evidence needed to support those inferences. At first blush, ECD and "educational data…
Descriptors: Educational Assessment, Psychometrics, Evidence, Computer Games
Yan, Gongjun – ProQuest LLC, 2010
Location is fundamental information in Vehicular Ad-hoc Networks (VANETs). Almost all VANET applications rely on location information. Therefore it is of importance to ensure location information integrity, meaning that location information is original (from the generator), correct (not bogus or fabricated) and unmodified (value not changed). We…
Descriptors: Confidentiality, Electronic Equipment, Geographic Location, Probability
Chen, M.-H.; Huang, M.-C.; Ting, Y.-C.; Chen, H.-H.; Li, T.-L. – IEEE Transactions on Education, 2010
In this article, a course on high-frequency wireless communications systems is presented. With the 145-MHz baseband subsystem available from a prerequisite course, the present course emphasizes the design and implementation of the 2.45-GHz front-end subsystem as well as system integration issues. In this curriculum, the 2.45-GHz front-end…
Descriptors: Prerequisites, Laboratories, Telecommunications, Computer Networks
Klemke, Roland; Ternier, Stefaan; Kalz, Marco; Specht, Marcus – British Journal of Educational Technology, 2010
Making learning objects available is critical to reuse learning resources. Making content transparently available and providing added value to different stakeholders is among the goals of the European Commission's eContentplus programme. This paper analyses standards and protocols relevant for making learning objects accessible in distributed data…
Descriptors: Foreign Countries, Metadata, Educational Resources, Computer Networks
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2009
Twitter (www.twitter.com) has become kind of a popular culture punch line. It's often used as a shorthand to represent how self-obsessed and self-involved the American culture has become, and while Twitter does lend itself to a kind of needless sharing, it also has some potentially useful features. Twitter is a microblogging service that allows…
Descriptors: Feedback (Response), Research Tools, Popular Culture, Outreach Programs

Peer reviewed
Direct link
