NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 961 to 975 of 2,008 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hadar, Irit; Sherman, Sofia; Hazzan, Orit – Journal of Information Systems Education, 2008
Collaboration has become increasingly widespread in the software industry as systems have become larger and more complex, adding human complexity to the technological complexity already involved in developing software systems. To deal with this complexity, human-centric software development methods, such as Extreme Programming and other agile…
Descriptors: Cooperation, Computer Software, Learning Processes, Management Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Christie, Derek – Teaching Statistics: An International Journal for Teachers, 2008
This article shows how to use Microsoft Excel to get data from the Internet into a statistically usable form.
Descriptors: Computer Literacy, Internet, Information Technology, Information Skills
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Drake, John R. – Journal of Information Technology Education: Innovations in Practice, 2012
Active learning has been championed in academic circles as the pedagogical fix to boring lectures typically found in introduction to information systems courses. However, the literature on active learning is mixed. In this paper, we critically examine active learning research and discover a misplaced emphasis leading to paradoxical findings in…
Descriptors: Classroom Techniques, Learning Theories, Class Activities, Course Objectives
Peer reviewed Peer reviewed
Direct linkDirect link
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Putnam, Cynthia – ProQuest LLC, 2010
User experience (UX) research in the design of technology products utilizes human-centered design (HCD) methods to summarize and explain pertinent information about end users to designers. However, UX researchers cannot effectively communicate the needs and goals of users if designers do not find UX research (a) easy to integrate into design…
Descriptors: Foreign Countries, Industry, Internet, Researchers
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Ling, Lai Ming; Nawawi, Nurul Hidayah Ahamad – Campus-Wide Information Systems, 2010
Purpose: This study aims to examine the ICT skills needed by a fresh accounting graduate when first joining a tax firm; to find out usage of electronic tax (e-tax) applications in tax practice; to assess the rating of senior tax practitioners on fresh graduates' ICT and e-tax applications skills; and to solicit tax practitioners' opinion regarding…
Descriptors: Foreign Countries, Taxes, Knowledge Level, College Graduates
Peer reviewed Peer reviewed
Direct linkDirect link
Atkinson, Chris; Newton, David – Journal of Sexual Aggression, 2010
This paper reviews the development of online technologies over the last 40 years in the context of the perceived risks to children. It reviews the literature on the main research, legislation and guidance and their role in the development of responses to safeguard children from the perceived threat of harm online. Significant gaps are found in the…
Descriptors: Young Adults, Internet, Adolescents, Information Technology
Cibbarelli, Pamela R. – Computers in Libraries, 2010
This article is the fourth in a series of articles published annually by "Computers in Libraries" surveying integrated library systems and services (ILSs). The purpose of the annual survey is to enable comparison of the ILSs that are available. ILS vendors are in constant pursuit of an ever-changing, consistently vague definition of what the…
Descriptors: Library Automation, Online Vendors, Library Development, Library Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Georgakopoulos, Alexia; Hawkins, Steven T. – Campus-Wide Information Systems, 2013
Purpose: This study aims to present Dramatic Problem Solving Facilitation Model (DPSFM) and Interactive Management (IM) as innovative alternative dispute resolution approaches that incorporate communication technologies in recording and analyzing data. DPSFM utilizes performance-based actions with facilitation methods to help participants design…
Descriptors: Computer Mediated Communication, Information Technology, Computer Uses in Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Jo, Il-Hyun – Asia Pacific Education Review, 2009
This study investigates the effect of the presentation of social network diagrams on virtual team members' interaction behavior via e-mail. E-mail transaction data from 22 software developers in a Korean IT company was analyzed and depicted as diagrams by social network analysis (SNA), and presented to the members as an intervention. Results…
Descriptors: Intervention, Network Analysis, Social Networks, Communities of Practice
Peer reviewed Peer reviewed
Direct linkDirect link
Salend, Spencer J. – TEACHING Exceptional Children, 2009
Although many teachers are using new technologies to differentiate instruction and administer tests, educators are also employing a range of technology-based resources and strategies to implement a variety of classroom assessments as alternatives to standardized and teacher-made testing. Technology-based classroom assessments focus on the use of…
Descriptors: Student Evaluation, Testing, Educational Technology, Teacher Made Tests
Sheehan, Kate – Computers in Libraries, 2009
Darien Library, where the author serves as head of knowledge and learning services, launched a new website on September 1, 2008. The website is built with Drupal, an open source content management system (CMS). In this article, the author describes how she and her colleagues overhauled the library's website to provide an open source content…
Descriptors: Computer Software, Database Management Systems, Web Sites, Library Automation
Peer reviewed Peer reviewed
Direct linkDirect link
Luik, Piret; Mikk, Jaan – Computers & Education, 2008
This paper reports the findings of a study that explored which characteristics of electronic textbooks correlated with knowledge acquisition by learners of different achievement levels. The study was carried out on 35 units of electronic textbooks that were studied by 19 high-achieving and 19 low-achieving students in four Estonian schools. The…
Descriptors: Textbooks, Achievement, Technology Uses in Education, Internet
Pages: 1  |  ...  |  61  |  62  |  63  |  64  |  65  |  66  |  67  |  68  |  69  |  ...  |  134