NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 91 to 105 of 2,184 results Save | Export
Vakaliuk, Tetiana; Antoniuk, Dmitry; Morozov, Andrii; Medvedieva, Mariia; Medvediev, Mykhailo – Online Submission, 2020
The paper proposes the use of green IT as a tool for designing a cloud-oriented sustainable learning environment for a higher education institution. The article substantiates the expediency of designing such an environment as a prerequisite for the sustainable development of Ukraine. It is established that one of the goals of Ukraine's sustainable…
Descriptors: Sustainable Development, Higher Education, Educational Technology, Integrated Learning Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Sara Willner-Giwerc; Chris Rogers; Kristen Wendell – International Journal of Designs for Learning, 2020
We describe a LEGO-compatible Internet of Things Technology (IoT) designed to enable elementary school students to learn about IoT by building their own smart, connected products. The Internet of Things is any network of physical devices that can share information over the internet. Using small, Wi-Fi enabled microprocessors, Grove sensors,…
Descriptors: Internet, Elementary School Students, Manipulative Materials, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kim How, Richeal Phil Thien; Zulnaidi, Hutkemri; Abdul Rahim, Suzieleez Syrene – Contemporary Educational Technology, 2022
The purpose of this study is to identify the teaching styles and problems that are faced by teachers in cultivating digital literacy skills for the topic of quadratic equations. This study helps to overcome and refine all shortcomings that occur in the process of instilling digital literacy skills into the topic of quadratic equations. This study…
Descriptors: Digital Literacy, Equations (Mathematics), Teaching Styles, Foreign Countries
Pokornowski, Ess – ITHAKA S+R, 2023
The landscape of higher education in prison programming is in the midst of a sea change. After eight years of the Second Chance Pell experiment, federal Pell grant funding for students who are incarcerated was fully reinstated on July 1, 2023. While Pell reinstatement will likely increase educational access for students who are incarcerated, it…
Descriptors: Educational Technology, Higher Education, Correctional Education, Correctional Institutions
Pokornowski, Ess – ITHAKA S+R, 2023
In Fall of 2022, Ithaka S+R launched a first-of-its-kind national survey on technology access in higher education in prison programs. The survey asked respondents about student access to technology in their Higher Education in Prison (HEP) program, focusing on four thematic areas: technological devices, learning management systems and software,…
Descriptors: Educational Technology, Higher Education, Correctional Education, Correctional Institutions
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pattra Suansokchuak; Pallop Piriyasurawong – Higher Education Studies, 2025
This article aims to present a new educational model that integrates engineering learning with design thinking via a cloud ecosystem to enhance digital intelligence for undergraduate students. This approach utilizes user-centered problem-solving to foster innovation and collaborative learning. The educational environment can adapt to 21st-century…
Descriptors: Design, Thinking Skills, Engineering Education, Undergraduate Students
Z. W. Taylor; Joshua Childs – Sage Research Methods Cases, 2022
This case study explains how to gather web metrics to measure the size, investment, and popularity of K-12 school system and higher education websites. This case study will first explain and define web metrics in detail, such as keywords, traffic, search engine optimization, and other terminology crucial for educational researchers to understand…
Descriptors: Search Engines, Evaluation, Web Sites, Educational Researchers
Peer reviewed Peer reviewed
Direct linkDirect link
Burda, Brittany U.; O'Connor, Elizabeth A.; Webber, Elizabeth M.; Redmond, Nadia; Perdue, Leslie A. – Research Synthesis Methods, 2017
Background: Systematic reviewers often encounter incomplete or missing data, and the information desired may be difficult to obtain from a study author. Thus, systematic reviewers may have to resort to estimating data from figures with little or no raw data in a study's corresponding text or tables. Methods: We discuss a case study in which…
Descriptors: Computer Software, Internet, Literature Reviews, Data Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hueston, Harry; Orton, George K., III – Administrative Issues Journal: Connecting Education, Practice, and Research, 2019
At West Texas A&M University, faculty members in the Criminal Justice and Emergency Management programs teach students how to deal with man-made and natural disasters. These program courses require students to learn about the National Incident Management Systems (NIMS) in addition to passing certain requirements. Each student must pass NIMS…
Descriptors: College Curriculum, Emergency Programs, Natural Disasters, Crisis Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Demirbilek, Muhammet – International Society for Technology, Education, and Science, 2022
It is inevitable to use information technologies in education field as in every field. Public and private educational institutions have attempted to equip classes with these technologies. One of these technologies is smart boards. Smart boards are set up in the classrooms of public education institutions within the scope of the FATIH project and…
Descriptors: Barriers, Teaching Methods, Computer Software, Technological Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Alan D. – International Journal of Adult Vocational Education and Technology, 2019
Customer relationship management (CRM) is a core business strategy for most organizations. In today's global economy, it is essential for organizations to find ways of increasing their productivity. This article discusses the operations management's decision of customer relationships management. It is vital for a business to motivate its employees…
Descriptors: Business, Productivity, Employees, Interpersonal Relationship
DeSerranno, Allen Ronald – ProQuest LLC, 2017
Internet of Things ("IoT") systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within…
Descriptors: Computer Software, Internet, Computer Networks, Engineering
Dawson, Nik; Martin, Alexandra; Sigelman, Matt; Levanon, Gad; Blochinger, Stephanie; Thornton, Jennifer; Chen, Janet – Business-Higher Education Forum, 2022
Across the U.S. economy, large-scale changes in work are occurring because of skills disruption: the constant re-invention of work driven by the vigorous, accelerating demand for new skills in virtually all jobs, and the spread of those skills across industries and around the world. In the past half decade, the average U.S. worker has had to…
Descriptors: Job Skills, Labor Needs, Change, Labor Force
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  146