Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 5 |
Descriptor
Source
| Discourse: Studies in the… | 1 |
| Educational Technology &… | 1 |
| Electronic Journal of… | 1 |
| Information Processing &… | 1 |
| International Association for… | 1 |
| ProQuest LLC | 1 |
| Searcher | 1 |
Author
Publication Type
| Journal Articles | 5 |
| Reports - Descriptive | 4 |
| Reports - Evaluative | 3 |
| Speeches/Meeting Papers | 2 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
Education Level
| Higher Education | 4 |
| Elementary Secondary Education | 3 |
| Postsecondary Education | 2 |
Audience
Location
| Australia | 3 |
| Germany | 2 |
| Greece | 2 |
| Pennsylvania | 2 |
| United Kingdom | 2 |
| Asia | 1 |
| Brazil | 1 |
| Bulgaria | 1 |
| Connecticut | 1 |
| Croatia | 1 |
| Cyprus | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Edwards, Richard; Carmichael, Patrick – Discourse: Studies in the Cultural Politics of Education, 2012
There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…
Descriptors: Information Technology, Semantics, Case Method (Teaching Technique), Hidden Curriculum
Verbert, Katrien; Manouselis, Nikos; Drachsler, Hendrik; Duval, Erik – Educational Technology & Society, 2012
In various research areas, the availability of open datasets is considered as key for research and application purposes. These datasets are used as benchmarks to develop new algorithms and to compare them to other algorithms in given settings. Finding such available datasets for experimentation can be a challenging task in technology enhanced…
Descriptors: Foreign Countries, Computer Uses in Education, Information Technology, Open Source Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Nevile, Liddy; Lissonnet, Sophie – 2003
A day in Cape York, in the far north east of Australia, can change the life of a modern Australian. In that time, one can see hundreds of examples of rock art that are up to 36,000 years old, sharply contrasting the history of Indigenous people and the immigration of Europeans.One such visit led to a proposed collaboration between the Quinkan…
Descriptors: Access to Information, Cataloging, Catalogs, Cooperative Programs
Peer reviewedArambura Cabo, Maria Jose; Berlanga Llavori, Rafael – Information Processing & Management, 1997
Presents a new application for retrieving news from a large electronic bank of newspapers that is intended to manage past issues of newspapers. Highlights include a data model for newspapers, including metadata and metaclasses; document definition language; document retrieval language; and memory organization and indexes. (Author/LRW)
Descriptors: Electronic Publishing, Indexes, Information Retrieval, Information Technology
Dingley, Andy; Shabajee, Paul – 2002
This paper reports on the development of a prototype authoring tool developed as part of on-going research around the needs of the ARKive project. The project holds text, rich-media and descriptions of factual statements about bio-diversity and conservation information. A key user community is that of school age children, requiring the mark-up of…
Descriptors: Authoring Aids (Programming), Biodiversity, Computer Software Development, Conservation (Environment)
Limanauskiene, Virginija; Stuikys, Vytautas – Electronic Journal of e-Learning, 2009
With the expansion of e-learning, the understanding and evaluation of already created e-learning environments is becoming an extremely important issue. One way to dealing with the problem is analysis of case studies, i.e. already created environments, from the reuse perspective. The paper presents a general framework and model to assess UNITE, the…
Descriptors: Electronic Learning, Communication Problems, Computer Assisted Instruction, Editing
McDermott, Irene E. – Searcher, 1999
Reports on Web keyword searching, metadata, Dublin Core, Extensible Markup Language (XML), metasearch engines (metasearch engines search several Web indexes and/or directories and/or Usenet and/or specific Web sites), and the Year 2000 (Y2K) dilemma, all topics discussed at the second annual Internet Librarian Conference sponsored by Information…
Descriptors: Conferences, Information Retrieval, Information Seeking, Information Technology
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Direct link
