Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 23 |
Descriptor
Source
Author
Publication Type
Education Level
Higher Education | 15 |
Postsecondary Education | 13 |
Elementary Secondary Education | 3 |
Secondary Education | 2 |
High Schools | 1 |
Middle Schools | 1 |
Two Year Colleges | 1 |
Location
Australia | 3 |
California | 3 |
United Kingdom | 2 |
United Kingdom (England) | 2 |
Africa | 1 |
Asia | 1 |
Canada | 1 |
China | 1 |
Colorado | 1 |
District of Columbia | 1 |
Egypt | 1 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
NEO Five Factor Inventory | 1 |
What Works Clearinghouse Rating
Ergado, Amanuel Ayde; Desta, Amare; Mehta, Hemini – International Journal of Education and Development using Information and Communication Technology, 2022
This paper is aimed at exploring the contributing factors for the integration of Information and Communication Technology (ICT) into higher education teaching-learning practices. For the study, a qualitative case study was used and the stakeholders from higher learning institutions were selected via purposive sampling. The data collected through…
Descriptors: Teaching Methods, Learning Processes, Computer Software, Information Systems
Moyo, Abel; Tsokota, Theo; Ruvinga, Caroline; Chipfumbu Kangara, Colletor T. – Technology, Knowledge and Learning, 2022
Use of Information and Communication Technologies (ICTs) offers extraordinary opportunities for society, particularly in the education sector. Many schools in Zimbabwe are now allowing the use of ICTs devices by learners in order to access the Internet and share educational material. However, there is considerable evidence that through use of…
Descriptors: Secondary School Students, Risk, Case Studies, School Districts
Hernandez, Ronald M.; Mederos, Liset Veitia; Cabrera de la Rosa, Fidel Jesus; Suarez Ramirez, Aleida; Menacho Vargas, Isabel; Alarcon Diaz, Henry; Robles, Nancy Cuenca; Pulido Capurro, Victor – International Journal of Higher Education, 2020
The objective of this article is to present the good practices in the conception of the redesign of spaces for university education in the Venezuelan context of the Sucre Mission, taking into consideration the historical context in which it takes place. The training of professionals is considered a priority for the development of nations, being…
Descriptors: Educational Practices, Educational Change, Educational History, Information Technology
Hertlein, Katherine M.; Twist, Markie L. C. – Journal of College Student Psychotherapy, 2017
The practice of sexting is becoming increasingly common among college students but has the potential to both initiate productive interactions with others and interfere with relationship development. The purpose of this paper is to report on the findings of a study on sexting among college students and to provide a framework through which…
Descriptors: Sexuality, Telecommunications, Handheld Devices, Synchronous Communication
Radovan, Marko; Perdih, Mojca – International Review of Research in Open and Distributed Learning, 2016
E-learning is a rapidly developing form of education. One of the key characteristics of e-learning is flexibility, which enables easier access to knowledge for everyone. Information and communications technology (ICT), which is e-learning's main component, enables alternative means of accessing the web-based learning materials that comprise the…
Descriptors: Guidelines, Internet, Instructional Materials, Instructional Material Evaluation
Merga, Margaret K.; Williams, Ross – Asia-Pacific Journal of Health, Sport and Physical Education, 2016
Contemporary health educators in schools are responsible for promoting the health of individual students, as well as a healthy school environment. The ongoing push for increasing device use in schools, which is underpinned by the information and communications technology (ICT) capability requirements of the new Australian Curriculum, can…
Descriptors: Health Education, Teacher Role, Risk Management, Health Promotion
Tran, Thang Manh; Stoilescu, Dorian – Journal of Information Technology Education: Research, 2016
This paper explores and analyses similarities and differences in ICT curricula, policies, and assessment between the Vietnamese and Australian educational systems for the final years of secondary educational level. It was found that while having a common core set of tendencies, the Australian ICT curricula, policies, and assessments differ…
Descriptors: Cross Cultural Studies, Content Analysis, Information Technology, Educational Policy
Richards, Jack C.; Reppen, Randi – RELC Journal: A Journal of Language Teaching and Research, 2014
Grammar can be viewed both as knowledge and as ability. When viewed as knowledge, the focus is on rules for sentence formation. When viewed as ability, the focus is on how grammar is used as a resource in the creation of spoken and written texts. Twelve principles are proposed as the basis for a pedagogy that focusses on acquiring learning to use…
Descriptors: Grammar, Second Language Instruction, Second Language Learning, Teaching Methods
Vedder, Richard G. – Journal of Information Technology Education: Innovations in Practice, 2012
In October 2012, Microsoft will release the commercial version of its next operating system, presently called "Windows 8." This version represents a significant departure from the past. Microsoft wants this operating system to meet user needs regardless of physical platform (e.g., desktop, notebook, tablet, mobile phone). As part of this mission,…
Descriptors: Computer Interfaces, Information Technology, Internet, Vendors
Welsh, Laura – ProQuest LLC, 2011
According to the World Tourism Organization, there were 935 million international tourists in 2010. International tourists collectively spent $852 billion on tourism products in 2009 (World Tourism Organization, 2011). A tourist's awareness, selection, and choice of tourism products are extremely dependent on the information used by the tourist…
Descriptors: Personality Traits, Values, Personality, Usability
Gurzick, David – ProQuest LLC, 2009
American adolescents have experienced growth in their use of online communities; yet, it was unknown whether the current understanding of online-community design applied to the design of communities specific to adolescents. This study bridged this gap, examining (a) How adolescents interact in an online community designed in accordance with…
Descriptors: Design Requirements, Adolescents, Interaction, Guidelines
Ikenberry, John; Hibel, Andrew; Freedman, Robert – Metropolitan Universities, 2010
Higher education recruitment has evolved over the years to utilize new technologies. The Internet has had the greatest impact on higher education recruitment and paved the way for many new ways of connecting recruiters with job seekers. The further development of Web 2.0 tools and social media has changed the landscape of recruiting and job…
Descriptors: Higher Education, Job Applicants, Recruitment, Internet
Abdallah, Mahmoud Mohammad Sayed – Online Submission, 2010
English language learning in general, and TESOL in particular, has been recently associated with some new literacy practices imposed by the Internet and other new ICTs which, according to Coiro et al. (2008), have been defining the concept of literacy in the 21st century. The changing social practices should be accompanied by a process of…
Descriptors: Preservice Teacher Education, Internet, Teacher Educators, English (Second Language)
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education