Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Information Technology | 5 |
Metadata | 5 |
Programming | 5 |
Foreign Countries | 4 |
Access to Information | 3 |
Computer System Design | 3 |
Barriers | 2 |
Case Studies | 2 |
Classification | 2 |
Comparative Analysis | 2 |
Computer Assisted Instruction | 2 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Drachsler, Hendrik | 1 |
Duval, Erik | 1 |
Limanauskiene, Virginija | 1 |
Lissonnet, Sophie | 1 |
Manouselis, Nikos | 1 |
Nevile, Liddy | 1 |
Stuikys, Vytautas | 1 |
Verbert, Katrien | 1 |
Publication Type
Journal Articles | 2 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 3 |
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
Australia | 3 |
Germany | 2 |
Greece | 2 |
Pennsylvania | 2 |
United Kingdom | 2 |
Asia | 1 |
Brazil | 1 |
Bulgaria | 1 |
Connecticut | 1 |
Croatia | 1 |
Cyprus | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Verbert, Katrien; Manouselis, Nikos; Drachsler, Hendrik; Duval, Erik – Educational Technology & Society, 2012
In various research areas, the availability of open datasets is considered as key for research and application purposes. These datasets are used as benchmarks to develop new algorithms and to compare them to other algorithms in given settings. Finding such available datasets for experimentation can be a challenging task in technology enhanced…
Descriptors: Foreign Countries, Computer Uses in Education, Information Technology, Open Source Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Limanauskiene, Virginija; Stuikys, Vytautas – Electronic Journal of e-Learning, 2009
With the expansion of e-learning, the understanding and evaluation of already created e-learning environments is becoming an extremely important issue. One way to dealing with the problem is analysis of case studies, i.e. already created environments, from the reuse perspective. The paper presents a general framework and model to assess UNITE, the…
Descriptors: Electronic Learning, Communication Problems, Computer Assisted Instruction, Editing
Nevile, Liddy; Lissonnet, Sophie – 2003
A day in Cape York, in the far north east of Australia, can change the life of a modern Australian. In that time, one can see hundreds of examples of rock art that are up to 36,000 years old, sharply contrasting the history of Indigenous people and the immigration of Europeans.One such visit led to a proposed collaboration between the Quinkan…
Descriptors: Access to Information, Cataloging, Catalogs, Cooperative Programs
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers