Publication Date
| In 2026 | 2 |
| Since 2025 | 386 |
| Since 2022 (last 5 years) | 2357 |
| Since 2017 (last 10 years) | 5291 |
| Since 2007 (last 20 years) | 12508 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 867 |
| Teachers | 484 |
| Administrators | 480 |
| Media Staff | 267 |
| Policymakers | 260 |
| Researchers | 169 |
| Students | 121 |
| Parents | 32 |
| Support Staff | 16 |
| Community | 13 |
| Counselors | 11 |
| More ▼ | |
Location
| Australia | 821 |
| United Kingdom | 627 |
| United States | 515 |
| Turkey | 439 |
| Canada | 422 |
| China | 329 |
| Spain | 253 |
| South Africa | 249 |
| India | 244 |
| California | 212 |
| United Kingdom (England) | 201 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
O'Leary, D. A.; Shattuck, J.; Kubby, J. – IEEE Transactions on Education, 2012
An undergraduate introductory science, technology, engineering, and math (STEM) class can be a jarring disappointment to new students expecting to work with cutting-edge, real-world technology. Their cell phones are often more technically advanced and real-world than the tools used in a class lab. Not surprisingly, many complain that the STEM labs…
Descriptors: Computer Uses in Education, Undergraduate Students, College Science, Energy Conservation
Lad, Abhimanyu – ProQuest LLC, 2011
There has been growing interest in building and optimizing retrieval systems with respect to relevance and novelty of information, which together more realistically reflect the usefulness of a system as perceived by the user. How to combine these criteria into a single metric that can be used to measure as well as optimize retrieval systems is an…
Descriptors: Information Technology, Information Retrieval, Online Searching, Evaluation
Singh, Rajendra – ProQuest LLC, 2011
This research takes steps towards developing a new theory of organizational information management based on the ideas that, first, information creates ordering effects in transactions and, second, that there are multiple centers of authority in organizations. The rationale for developing this theory is the empirical observation that hospitals have…
Descriptors: Information Management, Information Technology, Patients, Hospitals
Mulhearn, Michael F. – ProQuest LLC, 2011
Project management (PM) and systems engineering (SE) are essential skills in information technology (IT). There is an abundance of information available detailing the comprehensive bodies of knowledge, standards, and best practices. Despite the volume of information, there is surprisingly little information about how to tailor PM and SE tasks for…
Descriptors: Information Technology, Technology Planning, Artificial Intelligence, Information Systems
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Simeone, Michael – ProQuest LLC, 2011
Challenging the argument that liberal humanism faces extinction in the face of ubiquitous digital technologies, my dissertation analyzes the ways in which consumer electronics reinscribe the human subject as a privileged category in the information age. Through spaces like the Matrix, Windows 7, or even the single row of play controls on a…
Descriptors: Electronics, Cybernetics, Humanism, Fiction
Price, Kathleen J. – ProQuest LLC, 2011
The use of information technology is a vital part of everyday life, but for a person with functional impairments, technology interaction may be difficult at best. Information technology is commonly designed to meet the needs of a theoretical "normal" user. However, there is no such thing as a "normal" user. A user's capabilities will vary over…
Descriptors: Functional Behavioral Assessment, Interaction, Information Technology, Correlation
Liu, Dejang – ProQuest LLC, 2011
Belenky et al. (1997) found five ways of women's knowing (silent knowing, receiving knowing, subjective knowing, procedural knowing, and constructed knowing) according to the study conducted on women who majored in the social sciences and liberal arts. This study is built on the same model found by Belenky et al.'s study to collect open-ended…
Descriptors: Females, Epistemology, Two Year College Students, Community Colleges
Aponte, Jorge I. – ProQuest LLC, 2011
This qualitative case study explored the employee use of information and communication technologies (ICT) in a southern Puerto Rico healthcare organization. Thirty-two employees of a southern Puerto Rico healthcare organization provided their perspectives regarding their use of ICT in the workplace. The findings distinguished how employees use ICT…
Descriptors: Information Technology, Employees, Employee Attitudes, Qualitative Research
Cha, Un Un – ProQuest LLC, 2011
The current qualitative phenomenological study focused on how information technology (IT) leaders managed IT investment during the global economic downturn in the Taiwan IT industry. Organizations around the world spend billions of dollars on IT-related products and services every year. Determining an effective IT investment plan is a complex task…
Descriptors: Foreign Countries, Information Technology, Qualitative Research, Phenomenology
Bergen, Doris; Davis, Darrel – American Journal of Play, 2011
Many early developmental theorists such as Freud, Erikson, Piaget, and Vygotsky suggested that play--which the authors of this article define as both playful activity and playful thought--had the power to influence the moral emotions, behaviors, and reasoning of children. More recent researchers have also found evidence of moral development in…
Descriptors: Play, Moral Development, Video Games, Information Technology
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Rader, Heidi B. – Journal of Extension, 2011
The first Extension-authored link in Google Search (2011a) for "how to garden" was ranked an abysmal 82nd. Worse, Internet users selected the top-ranked site significantly more often than they selected the second-ranked one, and they rarely selected any site ranked lower than #10 (Granka, Joachims, & Gay, 2004). An…
Descriptors: Internet, Web Sites, Information Technology, Extension Education
Ohler, Jason – Kappa Delta Pi Record, 2011
The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are both proactive and aggressive. Taking this approach will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age…
Descriptors: Altruism, Ethical Instruction, Boards of Education, Values Education
Graham, Charles R. – Computers & Education, 2011
The technological pedagogical content knowledge (TPACK) framework is increasing in use by educational technology researchers around the world who are interested in issues related to technology integration. Much that is good can be found in the TPACK framework; however considerable theoretical work needs to be done if TPACK research is to cohere…
Descriptors: Technology Integration, Educational Technology, Pedagogical Content Knowledge, Researchers

Peer reviewed
Direct link
