Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Information Processing | 4 |
Information Technology | 4 |
Research Methodology | 4 |
Cognitive Processes | 1 |
Computer Software | 1 |
Computer System Design | 1 |
Computer Uses in Education | 1 |
Data Collection | 1 |
Databases | 1 |
Educational Researchers | 1 |
Evaluation Criteria | 1 |
More ▼ |
Author
Barzilai, Sarit | 1 |
Bearman, David | 1 |
Newton, Leonard | 1 |
Ram, Sudha | 1 |
Ramesh, Venkatar | 1 |
Trant, Jennifer | 1 |
Zohar, Anat | 1 |
Publication Type
Journal Articles | 4 |
Reports - Evaluative | 2 |
Reports - General | 1 |
Reports - Research | 1 |
Education Level
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Barzilai, Sarit; Zohar, Anat – Thinking Skills and Creativity, 2006
This study revisits a classic yet still intriguing question regarding information technology (IT): what difference does IT "really" make, in terms of people's thinking? In order to explore this question, the effects of IT in authentic research settings were studied through retrospective interviews with 24 academic researchers. Analysis of the…
Descriptors: Information Technology, Cognitive Processes, Educational Researchers, Information Processing
Bearman, David; Trant, Jennifer – D-Lib Magazine, 1998
Discusses asserting and assessing authenticity of digital information sources and why authenticity is an issue now. Describes three types of technical and social strategies (public, secret, and functionally dependent) for asserting authenticity. Cites examples of requirements for authenticity from the various stages in the research process. (AEF)
Descriptors: Evaluation Criteria, Evaluation Methods, Information Processing, Information Sources

Ramesh, Venkatar; Ram, Sudha – Information Systems, 1997
Presents a seven-step methodology for utilizing integrity constraint knowledge from heterogeneous databases. Describes generating a set of integrity constraints applicable at the integrated level from constraints specified on local databases. Introduces the concept of constraint-based relationships between objects in heterogeneous databases;…
Descriptors: Computer System Design, Databases, Information Processing, Information Technology

Newton, Leonard – Education in Science, 1998
Offers some strategies for enabling science teachers to make better use of data-logging methods. These ideas are grounded in the belief that science teachers are expert lesson planners. Benefits gained for students using data-logging techniques are more likely to be secured through teachers re-interpreting their planning approaches in the new…
Descriptors: Computer Software, Computer Uses in Education, Data Collection, Foreign Countries