NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 211 to 225 of 2,184 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Celestin, Bekolo Ngoa; Yunfei, Shao – International Journal of Training and Development, 2018
Researchers and practitioners have spent much time on and given a great deal of attention to the practical characteristics of professional development and its delivery in an attempt to understand the training transfer problem at the workplace. However, when we consider the individual employee as the primary agent of the transfer process, we cannot…
Descriptors: Instructional Effectiveness, Transfer of Training, Expectation, Teacher Surveys
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Korucu, Agâh Tugrul; Totan, Havva Nur – Participatory Educational Research, 2019
Information technologies literate is an individual who produces information, can use it functionally in life, can solve problems, think critically, has entrepreneurial, stable, communication skills, empathizes, contributes to society and culture etc. The purpose of this research is to examine the effectiveness of "Information Technologies and…
Descriptors: Information Technology, Computer Software, Citizenship, Student Attitudes
Korucu, Agâh Tugrul; Totan, Havva Nur – Online Submission, 2019
Information technologies literate is an individual who produces information, can use it functionally in life, can solve problems, think critically, has entrepreneurial, stable, communication skills, empathizes, contributes to society and culture etc. The purpose of this research is to examine the effectiveness of "Information Technologies and…
Descriptors: Information Technology, Computer Software, Citizenship, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ibrahim Bastug; Kagan Kircaburun – Journal of Pedagogical Research, 2017
In recent years, the number of students who have chosen computer science related undergraduate departments has decreased rapidly. Moreover, students who prefer computer science and programming departments appear to be unsuccessful in programming classes due to the complexity and frustrating difficulties of programming learning. One of the…
Descriptors: Student Attitudes, Programming, Computer Science Education, Middle School Students
Peer reviewed Peer reviewed
Direct linkDirect link
McGrew, Sarah; Breakstone, Joel; Ortega, Teresa; Smith, Mark; Wineburg, Sam – Theory and Research in Social Education, 2018
To be an informed citizen in today's information-rich environment, individuals must be able to evaluate information they encounter on the Internet. However, teachers currently have limited options if they want to assess students' evaluations of digital content. In response, we created a range of short tasks that assess students' "civic online…
Descriptors: Information Sources, Internet, Computer Software, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Edo, Concha; Yunquera, Juan; Bastos, Helder – Comunicar: Media Education Research Journal, 2019
The growing expansion of Internet access and mass-scale usage of social networking platforms and search engines have forced digital newspapers to deal with challenges, amongst which are the need to constantly update news, the increasing complexity of sources, the difficulty of exercising their function as gatekeepers in a fragmented environment in…
Descriptors: Journalism, Professionalism, Social Media, News Media
Peer reviewed Peer reviewed
Direct linkDirect link
Rodriguez-Gil, Luis; García-Zubia, Javier; Orduña, Pablo; López-de-Ipiña, Diego – IEEE Transactions on Learning Technologies, 2017
Online laboratories have traditionally been split between virtual labs, with simulated components; and remote labs, with real components. The former tend to provide less realism but to be easily scalable and less expensive to maintain, while the latter are fully real but tend to require a higher maintenance effort and be more error-prone. This…
Descriptors: Educational Technology, Technology Uses in Education, Laboratories, Simulated Environment
Kulkarni, Vivek – ProQuest LLC, 2017
Language on the Internet and social media varies due to time, geography, and social factors. For example, consider an online chat forum where people from different regions across the world interact. In such scenarios, it is important to track and detect regional variation in language. A person from the UK, who is in conversation with someone from…
Descriptors: Language Variation, Computational Linguistics, Internet, Social Media
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
Cyber threats can impact either the human (students, teachers, and staff) or the physical or virtual (e.g., information technology [IT] networks and systems) elements of schools and school districts. While there may be some overlap in addressing human versus physical/virtual threats, preparing for each type can require input from different…
Descriptors: Safety, School Safety, Information Technology, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Haider, Syed Imran; Ali, Muhammad – Pakistan Journal of Distance and Online Learning, 2019
The usage of various media methods in distance education shows its historical development path. It is said that AIOU has been using radio and television broadcasts, special textbooks and reading materials for distance education. To assess the level of technology usage and its role in AIOU model, Non-Random, Purposive Sampling, technique was used…
Descriptors: Barriers, Foreign Countries, Distance Education, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Jianhua – Educational Technology Research and Development, 2013
This article reports the design, development, and evaluation of an online software application for assessing students' understanding of curricular content based on concept maps. This computer-based assessment program, called the Assessment Agent System, was designed by following an agent-oriented software design method. The Assessment Agent System…
Descriptors: Artificial Intelligence, Computer System Design, Computer Software, Use Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Dias, Marco Adriano; Carvalho, Paulo Simeão; Ventura, Daniel Rodrigues – Physics Education, 2016
The Doppler effect is one of the recurring themes in college and high school classes. In order to contextualize the topic and engage the students in their own learning process, we propose a simple and easily accessible activity, i.e. the analysis of the videos available on the internet by the students. The sound of the engine of the vehicle…
Descriptors: Science Instruction, Scientific Concepts, Teaching Methods, Computer Software
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Odo, Dennis Murphy; Pace, Christi; Albers, Peggy – in education, 2017
This research investigates the social and socialization practices within an online professional development web seminar. The aim of this study was to identify the kinds of social and community building practices that occur in online professional development webinars by exploring how communication tools such as chat are used for community building…
Descriptors: Socialization, Critical Literacy, Professional Development, Internet
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Pages: 1  |  ...  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  ...  |  146