Publication Date
| In 2026 | 0 |
| Since 2025 | 368 |
| Since 2022 (last 5 years) | 2339 |
| Since 2017 (last 10 years) | 5273 |
| Since 2007 (last 20 years) | 12490 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 867 |
| Teachers | 482 |
| Administrators | 480 |
| Media Staff | 267 |
| Policymakers | 260 |
| Researchers | 169 |
| Students | 120 |
| Parents | 32 |
| Support Staff | 16 |
| Community | 13 |
| Counselors | 11 |
| More ▼ | |
Location
| Australia | 819 |
| United Kingdom | 627 |
| United States | 515 |
| Turkey | 439 |
| Canada | 422 |
| China | 329 |
| Spain | 253 |
| South Africa | 249 |
| India | 244 |
| California | 212 |
| United Kingdom (England) | 201 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Yim, Soobin; Warschauer, Mark; Zheng, Binbin; Lawrence, Joshua F. – Journal of Adolescent & Adult Literacy, 2014
The Common Core State Standards emphasize the integration of technology skills into English Language Arts (ELA) instruction, recognizing the demand for technology-based literacy skills to be college- and career- ready. This study aims to examine how collaborative cloud-based writing is used in in a Colorado school district, where one-to-one…
Descriptors: Language Arts, Collaborative Writing, State Standards, Academic Standards
Salomon-Fernandez, Yves – New England Journal of Higher Education, 2014
Within the information technology sector, cybersecurity is considered its own supersector. As information becomes increasingly digitized and a growing array of transactions can be completed in the cloud, people, governments and enterprises become increasingly more vulnerable. The Identity Theft Resources Center (ITRC) reports nearly 5,000 breaches…
Descriptors: Information Technology, Information Security, Community Colleges, Universities
Lee, Jeffrey; Sparks, Paul – International Journal of Education and Development using Information and Communication Technology, 2014
While advances have made it possible for the average Nepali to access mobile phones, computers, and digital cameras, barriers continue to impede access. Like other governments, Nepal responded in 2004 by creating about 80 telecenters to push sustainable technology to its people. Five years later, most telecenters struggle with sustainability. This…
Descriptors: Telecommunications, Foreign Countries, Barriers, Ethnography
Kirkwood, Donna; Shulsky, Debra; Willis, Jana – Childhood Education, 2014
The advent of technology and access to the internet through the World Wide Web have stretched the traditional ways of teaching social studies beyond classroom boundaries. This article explores how teachers can create authentic and contextualized cultural studies experiences for young children by integrating social studies and technology. To…
Descriptors: Social Studies, Citizenship Education, Information Technology, Global Education
Larsson, Ken – International Journal on E-Learning, 2014
This paper looks at the process of managing large numbers of exams efficiently and secure with the use of a dedicated IT support. The system integrates regulations on different levels, from national to local, (even down to departments) and ensures that the rules are employed in all stages of handling the exams. The system has a proven record of…
Descriptors: Computer Assisted Testing, Information Technology, Electronic Learning, Foreign Countries
Srivastava, Shilpa; Gulati, Ved Prakash – International Association for Development of the Information Society, 2014
Learning is essential in organizations for them to survive. However, given the changing environment owing to global inter-connectedness, mobile workforce, global unpredictability and complexities, the learning approach must also change. Today the Learning and Development unit must be able to facilitate collaborative work, develop learning…
Descriptors: Electronic Learning, Blended Learning, Educational Benefits, Management Systems
Agaoglu, Onur – Online Submission, 2014
It is crucial that gifted and talented students should be supported by different educational methods for their interests and skills. The science and arts centres (gifted centres) provide the Supportive Education Program for these students with an interdisciplinary perspective. In line with the program, an ICT lesson entitled "Computer…
Descriptors: Academically Gifted, Science Instruction, Science Activities, Special Education
Bichsel, Jacqueline; Feehan, Patrick – EDUCAUSE, 2014
Higher education IT governance, risk, and compliance (GRC) programs are in the development stage. Few institutions have all three programs in place, and many institutions are unclear where they should start when instituting or maturing their IT GRC programs. In addition, they are often uncertain as to whether GRC programs should be developed in…
Descriptors: Governance, Program Administration, Information Technology, Risk
Dillman, Don A.; Smyth, Jolene D.; Christian, Lean Melani – John Wiley & Sons, Inc, 2014
For over two decades, Dillman's classic text on survey design has aided both students and professionals in effectively planning and conducting mail, telephone, and, more recently, Internet surveys. The new edition is thoroughly updated and revised, and covers all aspects of survey research. It features expanded coverage of mobile phones, tablets,…
Descriptors: Surveys, Research Methodology, Telecommunications, Handheld Devices
Baldiris, Silvia; Graf, Sabine; Fabregat, Ramon; Mendez, Nestor Dario Duque – International Review of Research in Open and Distance Learning, 2012
Learning object economies are marketplaces for the sharing and reuse of learning objects (LO). There are many motivations for stimulating the development of the LO economy. The main reason is the possibility of providing the right content, at the right time, to the right learner according to adequate quality standards in the context of a lifelong…
Descriptors: Educational Technology, Virtual Classrooms, Lifelong Learning, Teaching Methods
VerBruggen, Robert – Academic Questions, 2012
Today's video games aren't even a little bit like the ones that came out a few decades ago. Not only has the underlying technology dramatically improved, but the medium has matured remarkably in the years since "Pong" and "Space Invaders." ruled the arcades. The artistic promise of video games has yet to be fulfilled. The current state of the…
Descriptors: Males, Video Games, Higher Education, Information Technology
Hawk, Nathan; Bartle, Gamin; Romine, Martha – Quarterly Review of Distance Education, 2012
The living lab (LL) is an open innovation ecosystem serving to provide opportunities for local stakeholders to practice research and to experiment with meaningful improvements for cities and other organizations. Living labs aim at involving the user as a cocreator. In this article the relationship between the LLs and a variety of stakeholders is…
Descriptors: Stakeholders, Innovation, Teaching Methods, Leadership
Lee, Chul Ho – ProQuest LLC, 2012
This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…
Descriptors: Information Technology, Information Security, Incentives, Outsourcing
DeSanto, Jerome P. – ProQuest LLC, 2012
The role of Chief Information Officer (CIO) in the higher education space is receiving increasing attention of late. Relatively nascent and sometimes mysterious, the individuals occupying this role need to possess an ever-evolving set of talents that could characterize them as renaissance men and women, or polymaths. The information technology…
Descriptors: Higher Education, College Administration, Administrator Characteristics, Information Technology
Herrera-Ruiz, Octavio – ProQuest LLC, 2012
Peer-to-Peer (P2P) technology has emerged as an important alternative to the traditional client-server communication paradigm to build large-scale distributed systems. P2P enables the creation, dissemination and access to information at low cost and without the need of dedicated coordinating entities. However, existing P2P systems fail to provide…
Descriptors: Information Technology, Client Server Architecture, Computer Networks, Automation

Peer reviewed
Direct link
