NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)14
Laws, Policies, & Programs
Assessments and Surveys
Learning and Study Strategies…1
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cyphert, Dale; Wurtz, M. Susan; Duclos, Leslie K. – Business Communication Quarterly, 2013
As business organizations grow increasingly virtual, traditional principles of organizational communication require examination and modification. This article considers the curricular implications of the growing business uses of virtual world technology through three different lenses--students as employee-users, students as strategic designers and…
Descriptors: Virtual Classrooms, Computer Mediated Communication, Educational Technology, Computer Simulation
Association Supporting Computer Users in Education, 2016
The Association Supporting Computer Users in Education (ASCUE) initiated a refereed track for paper submissions to the conference in 2008. In fact, at the 2008 business meeting, the membership approved three different presentation tracks: refereed with 3 blind reviews for each paper, session with paper where the author submits a paper but it is…
Descriptors: Computer Uses in Education, Computer Software, Conferences (Gatherings), Computers
Ennis, Lisa A.; Tims, Randy S. – Computers in Libraries, 2010
Back in 2008, the authors were looking for a tool that would replace the library's Outlook folders and much of what the library had stored on shared network drives. So they were mainly looking for something that would hold their documents, allow them to better organize those documents, offer an easy way to search for those documents, and be easy…
Descriptors: Information Technology, Internet, Higher Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Hadar, Irit; Sherman, Sofia; Hazzan, Orit – Journal of Information Systems Education, 2008
Collaboration has become increasingly widespread in the software industry as systems have become larger and more complex, adding human complexity to the technological complexity already involved in developing software systems. To deal with this complexity, human-centric software development methods, such as Extreme Programming and other agile…
Descriptors: Cooperation, Computer Software, Learning Processes, Management Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Bolch, Matt – T.H.E. Journal, 2008
Imagine school district staff inputting school data and sharing it in real time, managing teacher absences and arranging substitutes from the comfort of home, or deploying IT personnel to the right site at the right time to tackle the highest-priority jobs first. The concept of managing applications from anywhere with a network connection, known…
Descriptors: Teacher Attendance, Computer Software, Internet, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Gardner, Joel; Jeon, Tae – Journal of Educational Technology Systems, 2010
Merrill proposes First Principles of Instruction, including a problem- or task-centered strategy for designing instruction. However, when the tasks or problems are ill-defined or complex, task-centered instruction can be difficult to design. We describe an online task-centered training at a land-grant university designed to train employees to use…
Descriptors: Educational Strategies, Land Grant Universities, Web Based Instruction, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Wagner, William P.; Pant, Vik; Hilken, Ralph – Journal of Information Technology Education, 2008
eXtensible Markup Language (XML) is a new technology that is currently being extolled by many industry experts and software vendors. Potentially it represents a platform independent language for sharing information over networks in a way that is much more seamless than with previous technologies. It is extensible in that XML serves as a "meta"…
Descriptors: Internet, Computer Software, Information Technology, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Kwong, Theresa; Wong, Eva; Downing, Kevin – Interactive Technology and Smart Education, 2009
Purpose: The purpose of this paper is to exhibit the integration of learning and study strategies inventory (LASSI) with the City University of Hong Kong information systems to promote teaching and learning within the university. Design/methodology/approach: From the 2006 entry cohort, all undergraduate freshmen at City University of Hong Kong are…
Descriptors: Foreign Countries, Study Skills, Teaching Methods, Administrators
Peer reviewed Peer reviewed
Direct linkDirect link
Winter, Robert; Gericke, Anke; Bucher, Tobias – Educational Technology & Society, 2008
Business intelligence and information logistics have become an important part of teaching curricula in recent years due to the increased demand for adequately trained graduates. Since these fields are characterized by a high amount of software and methodology innovations, teaching materials and teaching aids require constant updating. Teradata has…
Descriptors: Feedback (Response), Intelligence, Action Research, Management Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2008
Data integration is one of the single most challenging tasks any district can face. Fortunately for school districts throughout the country with data scattered in disparate systems, an open specification known as the Schools Interoperability Framework (SIF) is mitigating that challenge. SIF has emerged as a cornerstone of K-12 data warehousing,…
Descriptors: Elementary Secondary Education, Computer Software, School Districts, Educational Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Swan, Gerry – Australasian Journal of Educational Technology, 2009
This paper is a report on the findings of a study conducted on the implementation of a portfolio system at the University of Kentucky. Interviews were conducted with faculty members and university supervisors about the use of a portfolio management tool that had been implemented in the teacher education program. Factors such as small program size…
Descriptors: Portfolios (Background Materials), Interpersonal Communication, Teacher Education Programs, Management Information Systems
School Administrator, 2005
School administrators face one of the most daunting challenges in history--providing quality learning environments during a tremendous financial crisis. The crisis may seem overwhelming, but web-native operations management technology offered by SchoolDude.com can help them overcome these challenges. The Internet makes technology more affordable…
Descriptors: Internet, School Administration, Cost Effectiveness, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Ballenger, Robert M. – Journal of Information Systems Education, 2007
This case provides a real-world semester long project-oriented case study for students enrolled in an electronic commerce course that has a significant development component. The case provides the technical framework in the form of functional requirements for students to design and build a fully functional transaction processing e-commerce Web…
Descriptors: Programming, Databases, Case Method (Teaching Technique), College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Sandvig, J. Christopher – Journal of Information Systems Education, 2007
The rapid growth of e-business and e-commerce has made server-side programming an increasingly important topic in information systems (IS) and computer science (CS) curricula. This article presents an overview of the major features of several popular server-side programming technologies and discusses the factors that influence the selection of…
Descriptors: Information Systems, Curriculum Development, Decision Making, Curriculum Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Previous Page | Next Page ยป
Pages: 1  |  2