Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 6 |
| Since 2017 (last 10 years) | 11 |
| Since 2007 (last 20 years) | 87 |
Descriptor
Source
Author
| Dillon, Andrew | 4 |
| Budzik, Jay | 3 |
| Hammond, Kristian | 3 |
| Allen, Bryce | 2 |
| Allen, Bryce L. | 2 |
| Belkin, Nicholas J. | 2 |
| Chen, Hsinchun | 2 |
| Cummings, Jeffrey | 2 |
| Feldman, Susan | 2 |
| Frick, Theodore W. | 2 |
| Harvey, Francis A. | 2 |
| More ▼ | |
Publication Type
Education Level
| Higher Education | 62 |
| Postsecondary Education | 36 |
| Adult Education | 5 |
| Elementary Secondary Education | 5 |
| Secondary Education | 1 |
Location
| United Kingdom | 8 |
| Pennsylvania | 4 |
| Canada | 3 |
| Austria | 2 |
| Germany | 2 |
| Greece | 2 |
| Minnesota | 2 |
| Netherlands | 2 |
| New York | 2 |
| New Zealand | 2 |
| United States | 2 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
Ryba, Ken; McIvor, Tom; Shakir, Maha; Paez, Di – E-Journal of Instructional Science and Technology, 2006
This study examined continuous automated speech recognition in the university lecture theatre. The participants were both native speakers of English (L1) and English as a second language students (L2) enrolled in an information systems course (Total N=160). After an initial training period, an L2 lecturer in information systems delivered three…
Descriptors: Student Surveys, Student Attitudes, Computer Assisted Instruction, Information Systems
Senapathi, Mali – Journal of Information Technology Education, 2005
The aim of the research is to derive a framework for the evaluation of Computer Aided Software Engineering (CASE) tool learnability in educational environments. Drawing from the literature of Human Computer Interaction and educational research, a framework for evaluating CASE tool learnability in educational environments is derived. The two main…
Descriptors: Evaluation Criteria, Evaluation Methods, Case Studies, Educational Environment
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design
Zhang, Ping – 1997
A graduate distance course on Information Systems Analysis and Design was designed and delivered under the guidance of the following four philosophies: (1) an effective education is a learner-centered education; (2) distance students are more likely to experience situated learning and problem-based learning; (3) enforced learning should enable…
Descriptors: Academic Achievement, Computer Assisted Instruction, Computer Mediated Communication, Computer System Design
Batt, Rosemary; Christopherson, Susan; Rightor, Ned; Van Jaarsveld, Danielle – 2001
A study was made of the labor market issues facing professionals and employers in the new media industry, an industry that combines elements of computing technology, telecommunications, and content to create products and services that can be used interactively by consumers and business owners. The study was carried out through a Web-based survey…
Descriptors: Adults, College Graduates, Computer Assisted Design, Computer Graphics

Peer reviewed
Direct link
