NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 2,041 to 2,055 of 26,268 results Save | Export
US Agency for International Development, 2023
USAID programs, in adherence with the Agency's 2018 Education Policy, prioritize learning experiences that build the skills children and youth in partner countries need to lead happy and productive lives, gain employment, and positively contribute to society. In the context of the COVID-19 pandemic, USAID programs increasingly aim to achieve these…
Descriptors: Digital Literacy, Access to Education, Employment Potential, Partnerships in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Babic; John Maynard; Ruth McLeod; Claudine Ford; Carla Torell; Narelle Eather – Australian Journal of Indigenous Education, 2023
The aim of this study was to develop, implement and evaluate the novel one-day, school-based health education program Yantiin Kalabara that embedded Aboriginal and Torres Strait Islander culture and perspectives within a series of interactive learning stations. In consultation with local Aboriginal and Torres Strait Islander community members, the…
Descriptors: Health Education, Culturally Relevant Education, Indigenous Knowledge, Indigenous Populations
Peer reviewed Peer reviewed
Direct linkDirect link
Hui, Bowen – International Journal of Information and Learning Technology, 2022
Purpose: The purpose of this work is to illustrate the processes involved in managing teams in order to assist designers and developers to build software that support teamwork. A deeper investigation into the role of team analytics is discussed in this article. Design/methodology/approach: Many researchers over the past several decades studied the…
Descriptors: Design, Guidelines, Research Needs, Teamwork
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eyuboglu, Fatma Aycan Binay; Yilmaz, Fatma Gizem Karaoglan – Education Quarterly Reviews, 2022
Individuals may encounter many negativities due to the misuse of computers and the Internet. Children suffer the most from these negativities. This situation necessitates parents who always protect and stand by their children, to become knowledgeable about the safe use of computers and the Internet. In this study, we examined the opinions of the…
Descriptors: Parent Attitudes, Internet, Computer Uses in Education, Child Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Mushtaque, Iqra; Awais-E-Yazdan, Muhammad; Waqas, Hamid – Cogent Education, 2022
This study's aim is to determine whether or not medical students in Pakistan are willing to use online learning during the COVID-19 pandemic, as well as their perception of and satisfaction with online learning. The study also analyzed the relationship between technology-related stress and computer self-efficacy among medical students. This…
Descriptors: Foreign Countries, Medical Students, Electronic Learning, Intention
Peer reviewed Peer reviewed
Direct linkDirect link
Grace, Karen Trister; Perrin, Nancy A.; Clough, Amber; Miller, Elizabeth; Glass, Nancy E. – Journal of American College Health, 2022
Objective: The purpose of this study was to examine correlates of reproductive coercion (RC) among a sample of college women in abusive relationships. Participants: 354 college students reporting a recent history of intimate partner violence (IPV). Methods: This study examines baseline data from a randomized controlled trial testing effectiveness…
Descriptors: College Students, Females, Violence, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Fujita, Taro – International Journal for Technology in Mathematics Education, 2018
This paper constructs an overview of the historical development of the International Journal for Technology in Mathematics Education (IJTME) during the period 2004- 2018. The titles of the published papers in this period are examined, focusing on what technological tools were studied, and what theoretical ideas were used to study the teaching and…
Descriptors: Periodicals, Educational Technology, Educational Theories, Bibliometrics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ullah, AMM Sharif; Harib, Khalifa H. – Education Sciences, 2018
This article addresses the issue of educating engineering students with the knowledge and skills of Computer-Aided Design and Manufacturing (CAD/CAM). In particular, three carefully designed tutorials--cutting tool offsetting, tool-path generation for freeform surfaces, and the integration of advanced machine tools (e.g., hexapod-based machine…
Descriptors: Computer Assisted Design, Engineering Education, Tutorial Programs, College Curriculum
Orgaz, Francisco; Moral, Salvador; Domínguez, Cándida M. – Journal of Educational Psychology - Propositos y Representaciones, 2018
This study aims to know the relationship between the variables attitude toward social networks, attitude toward technology, perception about technology and use of technology by university students. The methodology used has been a questionnaire, which has been applied to students of the Technological University of Santiago (UTESA) of the Dominican…
Descriptors: Foreign Countries, College Students, Student Attitudes, Social Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Davis, Gary Alan; Kohun, Frederick G. – Information Systems Education Journal, 2018
Personally-owned laptops and other "Bring-Your-Own-Device" (BYOD) scenarios have become increasingly prevalent in today's work environments and classrooms. However, few studies have examined the viability and practicality of such devices in the higher-education classroom. This study used a survey instrument to explore the concept of BYOD…
Descriptors: Computer Uses in Education, College Role, Laptop Computers, Undergraduate Students
Alexander, Charles – ProQuest LLC, 2018
Encryption based ransomware operates by iterating through all files with specific extensions on the computer and mutating them into an unusable form. The mutation, in many cases, can only be reversed if the user pays the operator of the ransomware a fee to get their files back. K-12 school districts have fallen victim to rampant malware as a…
Descriptors: Computer Security, School Districts, Elementary Secondary Education, Computer Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Miloslavov, Aleksei; Kuzmina, Olga – NORDSCI, 2018
At present, in the literature that is are devoted to social life, it has become commonplace to claim that we live in the era of the "digital revolution". Our paper deals with computer science in the period from the late 40's to early 60's of the twentieth century, which is considered from the point of view of "intellectual…
Descriptors: Information Technology, History, Computer Science, Cultural Differences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Jeong; Lee, Young; Fernandez, Amanda; Sanchez, Joshua – Journal of Cybersecurity Education, Research and Practice, 2020
As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure…
Descriptors: Computer Security, Programming Languages, Programming, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
de Lange, Peter; Goschlberger, Bernhard; Farrell, Tracie; Neumann, Alexander Tobias; Klamma, Ralf – IEEE Transactions on Learning Technologies, 2020
Learning in communities of practice (CoPs) makes up a significant portion of today's knowledge gain. However, only little technological support is tailored specifically toward CoPs and their particular strengths and challenges. Even worse, CoPs often do not possess the resources to host or develop a software ecosystem to support their activities.…
Descriptors: Communities of Practice, Computer Uses in Education, Learning, Computer System Design
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zhao, Fang; Gaschler, Robert; Schnotz, Wolfgang; Wagner, Inga – Frontline Learning Research, 2020
Regulation of distance to the screen (i.e., head-to-screen distance, fluctuation of head-to-screen distance) has been proved to reflect the cognitive engagement of the reader. However, it is still not clear (a) whether regulation of distance to the screen can be a potential parameter to infer high cognitive load and (b) whether it can predict the…
Descriptors: Proximity, Computer Use, Learner Engagement, Cognitive Processes
Pages: 1  |  ...  |  133  |  134  |  135  |  136  |  137  |  138  |  139  |  140  |  141  |  ...  |  1752