Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 13 |
| Since 2017 (last 10 years) | 18 |
| Since 2007 (last 20 years) | 212 |
Descriptor
| Computer System Design | 463 |
| Information Technology | 463 |
| Computer Software | 128 |
| Educational Technology | 104 |
| Computer Networks | 87 |
| Foreign Countries | 87 |
| Internet | 87 |
| Information Systems | 83 |
| Higher Education | 75 |
| Computer Uses in Education | 65 |
| Programming | 62 |
| More ▼ | |
Source
Author
| Burmood, Jennifer, Comp. | 3 |
| Nixon, Carol, Comp. | 3 |
| Chen, Chun-Hua | 2 |
| Flaherty, William | 2 |
| Grush, Mary | 2 |
| Huang, Chenn-Jung | 2 |
| Lunin, Lois F. | 2 |
| Luo, Yun-Cheng | 2 |
| Lynch, Clifford A. | 2 |
| Marchionini, Gary | 2 |
| Smith, Peter, Ed. | 2 |
| More ▼ | |
Publication Type
Education Level
| Higher Education | 114 |
| Postsecondary Education | 68 |
| Elementary Secondary Education | 24 |
| Adult Education | 15 |
| Secondary Education | 8 |
| High Schools | 5 |
| Elementary Education | 2 |
Location
| United Kingdom | 9 |
| California | 8 |
| Taiwan | 7 |
| Pennsylvania | 6 |
| United States | 6 |
| Canada | 5 |
| India | 5 |
| Spain | 5 |
| Australia | 4 |
| Massachusetts | 4 |
| Germany | 3 |
| More ▼ | |
Laws, Policies, & Programs
| Americans with Disabilities… | 1 |
| Carl D Perkins Vocational and… | 1 |
| Health Insurance Portability… | 1 |
| No Child Left Behind Act 2001 | 1 |
| Telecommunications Act 1996 | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
| Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
Boyle, Tom – Computers & Education, 2010
The use of ICT to enhance teaching and learning depends on effective design, which operates at many levels of granularity from the small to the very large. This reflects the range of educational problems from course design down to the design of activities focused on specific learning objectives. For maximum impact these layers of design need to be…
Descriptors: Design Requirements, Research and Development, Instructional Design, Models
Chen, Mu-Yen; Chang, Francis Mou-Te; Chen, Chia-Chen; Huang, Mu-Jung; Chen, Jing-Wen – Educational Technology & Society, 2012
As the use of Information Technology (IT) applications has become more widespread, focus has turned toward applying IT to the learning domain, with policy initiatives aimed at integrating IT with teaching. E-Portfolios have assumed growing importance in higher education as institutions seek new teaching-learning-assessment tools to increase…
Descriptors: Foreign Countries, Student Motivation, Student Attitudes, Information Technology
Bitton, Ephrat – ProQuest LLC, 2011
This dissertation explores the use of geometric and graphical models for a variety of information search and filtering applications. These models serve to provide an intuitive understanding of the problem domains and as well as computational efficiencies to our solution approaches. We begin by considering a search and rescue scenario where both…
Descriptors: Safety, Opinions, Hypothesis Testing, Intuition
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Ali, Qasim – ProQuest LLC, 2009
Collective communication allows efficient communication and synchronization among a collection of processes, unlike point-to-point communication that only involves a pair of communicating processes. Achieving high performance for both kernels and full-scale applications running on a distributed memory system requires an efficient implementation of…
Descriptors: Workstations, Mathematics, Computer System Design, Programming
Huang, Peng – ProQuest LLC, 2010
Innovation ecosystem strategy is often adopted by platform technology owners to seek complementary innovation from resources located outside the firm to exploit indirect network effect. In this dissertation I aim to address the issues that are related to the formation and business value of platform innovation ecosystems in the enterprise software…
Descriptors: Industry, Intellectual Property, Innovation, Computer Software
A New Student Performance Analysing System Using Knowledge Discovery in Higher Educational Databases
Guruler, Huseyin; Istanbullu, Ayhan; Karahasan, Mehmet – Computers & Education, 2010
Knowledge discovery is a wide ranged process including data mining, which is used to find out meaningful and useful patterns in large amounts of data. In order to explore the factors having impact on the success of university students, knowledge discovery software, called MUSKUP, has been developed and tested on student data. In this system a…
Descriptors: Income, Computer Software, Databases, Data Analysis
Kostaras, N.; Xenos, M.; Skodras, A. N. – IEEE Transactions on Education, 2011
This paper presents the usability evaluation of a digital systems laboratory class offered to distance-learning students. It details the way in which students can participate remotely in such a laboratory, the methodology employed in the usability assessment of the laboratory infrastructure (hardware and software), and also outlines the main…
Descriptors: Foreign Countries, Educational Quality, Laboratories, Pilot Projects
Davault, Julius M., III. – ProQuest LLC, 2009
One of the problems associated with automatic thesaurus construction is with determining the semantic relationship between word pairs. Quasi-synonyms provide a type of equivalence relationship: words are similar only for purposes of information retrieval. Determining such relationships in a thesaurus is hard to achieve automatically. The term…
Descriptors: Semantics, Information Retrieval, Computational Linguistics, Reference Materials
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Nordin, Norazah; Ibrahim, Sham; Mohd. Hamzah, Mohd. Izham; Embi, Mohamed Amin; Din, Rosseni – Turkish Online Journal of Educational Technology - TOJET, 2012
The development in information technology has now moved from the first wave that emphasises on computer technical skills to the second wave which focuses on the application and management aspects. This paper aims to investigate the use of learning management system among future school heads in education management and leadership. The study was…
Descriptors: Educational Technology, Information Technology, Leadership, Learning Strategies
Lau, Paul Ngee Kiong; Lau, Sie Hoe; Hong, Kian Sam; Usop, Hasbee – Educational Technology & Society, 2011
The number right (NR) method, in which students pick one option as the answer, is the conventional method for scoring multiple-choice tests that is heavily criticized for encouraging students to guess and failing to credit partial knowledge. In addition, computer technology is increasingly used in classroom assessment. This paper investigates the…
Descriptors: Guessing (Tests), Multiple Choice Tests, Computers, Scoring
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Ryan, Jenna; Porter, Marjorie; Miller, Rebecca – Journal of Information Technology Education, 2010
Current literature on libraries is abundant with articles about the uses and the potential of new interactive communication technology, including Web 2.0 tools. Recently, the advent and use of virtual worlds have received top billing in these works. Many library institutions are exploring these virtual environments; this exploration and the…
Descriptors: Academic Libraries, Virtual Classrooms, Social Environment, Library Automation
Goel, Sanjay; Kathuria, Vanshi – Journal of Information Technology Education, 2010
The majority of an engineer's time in the software industry is spent working with other programmers. Agile methods of software development like eXtreme Programming strongly rely upon practices like daily meetings and pair programming. Hence, the need to learn the skill of working collaboratively is of primary importance for software developers.…
Descriptors: Computer Science Education, Programming, Teaching Methods, Introductory Courses

Peer reviewed
Direct link
