Publication Date
In 2025 | 8 |
Since 2024 | 46 |
Since 2021 (last 5 years) | 90 |
Since 2016 (last 10 years) | 276 |
Since 2006 (last 20 years) | 1598 |
Descriptor
Computer System Design | 3455 |
Foreign Countries | 807 |
Educational Technology | 791 |
Computer Software | 789 |
Computer Assisted Instruction | 609 |
Higher Education | 574 |
Internet | 534 |
Instructional Design | 528 |
Information Technology | 463 |
Models | 390 |
Electronic Learning | 385 |
More ▼ |
Source
Author
Spink, Amanda | 11 |
Marchionini, Gary | 10 |
Alonzo, Julie | 9 |
Tindal, Gerald | 9 |
Barker, Philip | 8 |
Hwang, Gwo-Jen | 7 |
Lai, Cheng Fei | 7 |
Clancey, William J. | 6 |
Dillon, Andrew | 6 |
Tseng, Shian-Shyong | 6 |
Aleven, Vincent | 5 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 110 |
Teachers | 75 |
Media Staff | 38 |
Researchers | 37 |
Administrators | 34 |
Policymakers | 21 |
Students | 10 |
Community | 3 |
Parents | 3 |
Location
United Kingdom | 87 |
Taiwan | 60 |
Australia | 47 |
Canada | 45 |
Spain | 45 |
Germany | 39 |
Pennsylvania | 28 |
Greece | 25 |
United States | 24 |
Turkey | 22 |
European Union | 21 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad – Journal of Information Technology Education, 2011
Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…
Descriptors: Foreign Countries, Plagiarism, Programming Languages, Computer Software
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Deutschmann, Mats; Panichi, Luisa – International Journal of Virtual and Personal Learning Environments, 2013
This paper presents some of the overall frameworks and models for language learning that were used under Avalon (Access to Virtual and Action Learning live ONline), an EU co-funded project aimed at developing language-learning scenarios in virtual worlds. The introduction and background summarize some of the theories that constitute the starting…
Descriptors: Virtual Classrooms, Computer Simulation, Computer System Design, Models
Waalkens, Maaike; Aleven, Vincent; Taatgen, Niels – Computers & Education, 2013
Intelligent tutoring systems (ITS) support students in learning a complex problem-solving skill. One feature that makes an ITS architecturally complex, and hard to build, is support for strategy freedom, that is, the ability to let students pursue multiple solution strategies within a given problem. But does greater freedom mean that students…
Descriptors: Intelligent Tutoring Systems, Problem Solving, Algebra, Mathematics Instruction
Svetsky, Stefan; Moravcik, Oliver; Schreiber, Peter; Stefankova, Jana – Online Submission, 2013
The state of the art of TEL (technology-enhanced learning) is characterised by a technological-driven approach. Learning management systems or learning courses for management systems are mentioned as frequently used basic tools for this purpose. However, these Internet technologies are not suitable for the personalized support of teachers on…
Descriptors: Foreign Countries, Computer Uses in Education, Computer Software, Electronic Learning
Moseley, Alex – International Journal of Game-Based Learning, 2012
Drawing on a participatory study of the Perplex City alternate reality game, this paper considers the data obtained through participation and a detailed survey of the most engaged players, in order to determine the most engaging features and suggest methods for their transfer to educational contexts. Originally presented at a conference in 2008,…
Descriptors: Computer Games, Educational Games, Game Theory, Learner Engagement
García-García, César; Fernández-Robles, José Luis; Larios-Rosillo, Victor; Luga, Hervé – International Journal of Game-Based Learning, 2012
This article presents the current development of a serious game for the simulation of massive evacuations. The purpose of this project is to promote self-protection through awareness of the procedures and different possible scenarios during the evacuation of a massive event. Sophisticated behaviors require massive computational power and it has…
Descriptors: Computer Games, Computer Simulation, Educational Games, Crisis Management
Mattord, Herbert J. – ProQuest LLC, 2012
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
Descriptors: Internet, Electronic Learning, Comparative Analysis, Benchmarking
Bollin, Andreas; Hochmuller, Elke; Mittermeir, Roland; Samuelis, Ladislav – IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012
Software Engineering education must account for a broad spectrum of knowledge and skills software engineers will be required to apply throughout their professional life. Covering all the topics in depth within a university setting is infeasible due to curricular constraints as well as due to the inherent differences between educational…
Descriptors: Engineering Education, Computer Software, Integrated Curriculum, Computer Simulation
Nakajima, Taira – Association for the Advancement of Computing in Education, 2012
The author demonstrates a new system useful for reflective learning. Our new system offers an environment that one can use handwriting tablet devices to bookmark symbolic and descriptive feedbacks into simultaneously recorded videos in the environment. If one uses video recording and feedback check sheets in reflective learning sessions, one can…
Descriptors: Foreign Countries, Computer Assisted Instruction, Feedback (Response), Handwriting
Ehrsam, Hank – School Business Affairs, 2012
Paying for employee turnover costs, data storage, and multiple layers of benefits can be difficult for fiscally constrained institutions, especially as budget cuts and finance-limiting legislation abound in school districts across the country. Many traditional paper-based systems have been replaced with automated, software-based services, helping…
Descriptors: Personnel Management, Human Resources, Redundancy, Program Improvement
Nedungadi, Prema; Raman, Raghu – Educational Technology Research and Development, 2012
Most personalized learning systems are designed for either personal computers (e-learning) or mobile devices (m-learning). Our research has resulted in a cloud-based adaptive learning system that incorporates mobile devices into a classroom setting. This system is fully integrated into the formative assessment process and, most importantly,…
Descriptors: Electronic Learning, Feedback (Response), Formative Evaluation, Telecommunications
Alcoholado, C.; Nussbaum, M.; Tagle, A.; Gomez, F.; Denardin, F.; Susaeta, H.; Villalta, M.; Toyama, K. – Journal of Computer Assisted Learning, 2012
Single Display Groupware (SDG) allows multiple people in the same physical space to interact simultaneously over a single communal display through individual input devices that work on the same machine. The aim of this paper is to show how SDG can be used to improve the way resources are used in schools, allowing students to work simultaneously on…
Descriptors: Foreign Countries, Educational Technology, Computer Peripherals, Computer Software
Mu, Jin; Stegmann, Karsten; Mayfield, Elijah; Rose, Carolyn; Fischer, Frank – International Journal of Computer-Supported Collaborative Learning, 2012
Research related to online discussions frequently faces the problem of analyzing huge corpora. Natural Language Processing (NLP) technologies may allow automating this analysis. However, the state-of-the-art in machine learning and text mining approaches yields models that do not transfer well between corpora related to different topics. Also,…
Descriptors: Semantics, Classification, Syntax, Coding
Tambouris, Efthimios; Zotou, Maria; Kalampokis, Evangelos; Tarabanis, Konstantinos – International Journal of Training and Development, 2012
Enterprise architecture (EA) implementation refers to a set of activities ultimately aiming to align business objectives with information technology infrastructure in an organization. EA implementation is a multidisciplinary, complicated and endless process, hence, calls for adequate education and training programs that will build highly skilled…
Descriptors: Foreign Countries, Business Administration, Program Content, Educational Policy