Publication Date
| In 2026 | 0 |
| Since 2025 | 24 |
| Since 2022 (last 5 years) | 211 |
| Since 2017 (last 10 years) | 494 |
| Since 2007 (last 20 years) | 1280 |
Descriptor
| Information Technology | 2008 |
| Computer Software | 1777 |
| Foreign Countries | 674 |
| Educational Technology | 479 |
| Higher Education | 430 |
| Teaching Methods | 407 |
| Internet | 404 |
| Computer Uses in Education | 261 |
| Technology Integration | 229 |
| Computer Assisted Instruction | 219 |
| Student Attitudes | 197 |
| More ▼ | |
Source
Author
| Raths, David | 5 |
| Villano, Matt | 5 |
| Waters, John K. | 5 |
| Panettieri, Joseph C. | 4 |
| Wheeler, Brad | 4 |
| Almeroth, Kevin | 3 |
| Asuncion, Jennison V. | 3 |
| Barile, Maria | 3 |
| Cummings, Jeff | 3 |
| Dagiene, Valentina | 3 |
| Fichten, Catherine S. | 3 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 87 |
| Teachers | 56 |
| Administrators | 43 |
| Media Staff | 29 |
| Policymakers | 23 |
| Researchers | 20 |
| Students | 13 |
| Community | 2 |
| Parents | 2 |
Location
| United Kingdom | 56 |
| Australia | 54 |
| Turkey | 39 |
| United States | 39 |
| California | 31 |
| Canada | 26 |
| China | 25 |
| Spain | 23 |
| United Kingdom (England) | 23 |
| Taiwan | 19 |
| South Africa | 17 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Denner, Jill; Werner, Linda; Ortiz, Eloy – Computers & Education, 2012
Computer game programming has been touted as a promising strategy for engaging children in the kinds of thinking that will prepare them to be producers, not just users of technology. But little is known about what they learn when programming a game. In this article, we present a strategy for coding student games, and summarize the results of an…
Descriptors: Females, Computer Uses in Education, Computers, Programming
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Ramaswami, Rama – Campus Technology, 2010
Back in the 1990s, enterprise resource planning (ERP) systems may not have been user-friendly, but what they tried to do was totally reasonable: replace stand-alone systems in various departments--such as finance, logistics, and human resources--with a single integrated software program. The idea was that although each department would still have…
Descriptors: Computer Software, Technology, Technology Integration, Colleges
Dishaw, Mark T.; Eierman, Michael A.; Iversen, Jacob H.; Philip, George – Journal of Information Technology Education: Research, 2013
As collaboration among teams that are distributed in time and space is becoming increasingly important, there is a need to understand the efficacy of tools available to support that collaboration. This study employs a combination of the Technology Acceptance Model (TAM) and the Task-Technology Fit (TTF) model to compare four different technologies…
Descriptors: Cooperation, Collaborative Writing, Electronic Publishing, Word Processing
Waguespack, Leslie J. – Information Systems Education Journal, 2011
As punishment in the biblical story of Moses the slaves were told they had to make bricks without straw. This was impossible because bricks made without straw had the appearance of strength and function but could not withstand the proof of actual use. The slaves' punishment was therefore not only to make bricks, but also to find the straw on their…
Descriptors: Information Systems, Computer Science Education, Computer Software, Design
Jonnalagadda, Siddhartha – ProQuest LLC, 2011
In the current millennium, extensive use of computers and the internet caused an exponential increase in information. Few research areas are as important as information extraction, which primarily involves extracting concepts and the relations between them from free text. Limitations in the size of training data, lack of lexicons and lack of…
Descriptors: Sentences, Semantics, Biomedicine, Information Retrieval
Song, Hae-Deok; Wang, Wei-Tsong; Liu, Chao-Yueh – Educational Technology & Society, 2011
Faculty members have different concerns as they integrate new technology into their teaching practices. The integration of Web-Based Instruction in higher-education settings will not be successful if these faculty concerns are not addressed. Four main stages of faculty concern (information, personal, management, and impact) were identified based…
Descriptors: Web Based Instruction, Computer Software, Groups, Internet
Sponza, Maria – Australian Journal of Career Development, 2011
This practice application brief reviews the preparation, implementation, and evaluation of running behavioural interviews online. In a collaborative program between the School of Information Technology and the Careers and Employment service at Deakin University in Australia, students demonstrated their ability to articulate their generic…
Descriptors: Employment Services, Information Technology, Foreign Countries, Interviews
Goldsborough, Reid – Education Digest: Essential Readings Condensed for Quick Review, 2009
It has been said that a computer lets a person make more mistakes faster than any other invention in human history, with the possible exceptions of handguns and tequila. Computers also make mistakes on their own, whether they're glitches, conflicts, bugs, crashes, or failures. Avoiding glitches is considerably less frustrating than trying to fix…
Descriptors: Maintenance, Computers, Computer Software, Computer Security
He, Wu; Yen, Cherng-Jyh – Journal of Information Systems Education, 2014
More and more information technology (IT) programs are offering distance learning courses to their students. However, to date, there are a very limited number of published articles in the IT education literature that compare how different methods of delivering distance course relate to undergraduate students' learning outcomes in IT software…
Descriptors: Programming, Computer Software, Computer Science Education, Participant Satisfaction
Kiriakidis, Peter – International Journal on E-Learning, 2012
How does Skype, as an online communication tool, contribute to school and district administrators' reported level of self-efficacy? A sample of n = 39 participants of which 22 were school administrators and 17 were district administrators was purposefully selected to use Skype in their offices with a webcam and microphone to communicate with other…
Descriptors: Stakeholders, Self Efficacy, Video Technology, Computer Software
Romiszowski, Alexander J. – Educational Technology, 2012
"Cloud computing is a model for the enabling of ubiquitous, convenient, and on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and other services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." This…
Descriptors: Computers, Educational Technology, Schools, Electronic Learning
Stephens, Wendy – Knowledge Quest, 2012
In the championship playoffs of professional learning tools, this author contends that there is a clear-cut victor. Customizable, platform-agnostic, able to circumvent filters--both browser and network-imposed--RSS is the best professional learning tool. Reading sites via RSS has appeal for those who want the raw information. With a well-honed…
Descriptors: Internet, Web Sites, Electronic Publishing, Learning Experience
Sondergaard, Harald; Mulder, Raoul A. – Computer Science Education, 2012
We examine student peer review, with an emphasis on formative practice and collaborative learning, rather than peer grading. Opportunities to engage students in such formative peer assessment are growing, as a range of online tools become available to manage and simplify the process of administering student peer review. We consider whether…
Descriptors: Cooperative Learning, Peer Evaluation, Formative Evaluation, Intellectual Disciplines
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security

Peer reviewed
Direct link
