Publication Date
| In 2026 | 0 |
| Since 2025 | 67 |
| Since 2022 (last 5 years) | 282 |
| Since 2017 (last 10 years) | 777 |
| Since 2007 (last 20 years) | 2170 |
Descriptor
Source
Author
| McClure, Charles R. | 16 |
| Bryant, Rebecca | 9 |
| Penrod, James I. | 9 |
| Telem, Moshe | 9 |
| Glover, Robert H. | 8 |
| Lavoie, Brian | 8 |
| Thomas, Charles R. | 8 |
| Bozeman, William C. | 7 |
| Groff, Warren H. | 7 |
| Howard, Richard D. | 7 |
| Johnson, L. | 7 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 513 |
| Administrators | 358 |
| Policymakers | 114 |
| Researchers | 104 |
| Teachers | 98 |
| Media Staff | 74 |
| Students | 18 |
| Support Staff | 8 |
| Community | 6 |
| Parents | 5 |
| Counselors | 4 |
| More ▼ | |
Location
| Australia | 118 |
| California | 98 |
| United States | 88 |
| Canada | 84 |
| Texas | 79 |
| United Kingdom | 79 |
| Florida | 55 |
| Pennsylvania | 45 |
| Illinois | 44 |
| New York | 44 |
| Ohio | 44 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
Huang, Yong-Ming; Liu, Chien-Hung; Lee, Chun-Yi; Huang, Yueh-Min – Educational Technology & Society, 2012
Museum learning has received a lot of attention in recent years. Museum learning refers to people's use of museums to acquire knowledge. However, a problem with information overload has caused in engaging in such learning. Information overload signifies that users encounter a mass of information and need to determine whether certain information…
Descriptors: Information Needs, Museums, Feedback (Response), User Satisfaction (Information)
Perez, Rafael G. – ProQuest LLC, 2013
The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…
Descriptors: Information Security, Information Management, Correlation, Administrative Organization
Davalos, Eugenia – ProQuest LLC, 2013
One of the core strategies to transform the United States national healthcare system is the implementation of key technologies such as the electronic patient medical record. Such key technologies improve patient care and help the organization gain competitive advantage. With a high demand for strategic and operational change, healthcare providers…
Descriptors: Health Services, Medical Services, Information Technology, Information Management
Sharif, Raed M. – ProQuest LLC, 2013
Although there appears to be a broad recognition of the key role that Public Sector Information (PSI) can play in the development of societies, there are still significant gaps in our understanding of how PSI is actually being utilized and of its wider societal value, especially in developing countries. The overarching goal of this dissertation…
Descriptors: Foreign Countries, Information Utilization, Public Sector, Developing Nations
Handfield, Amy E. – Journal of Access Services, 2017
This article addresses the development of electronic reserves within academic libraries. Libraries have been offering electronic reserve services on separate platforms since the 1990s (Austin, 2013). However, since the integration of campus-wide content management systems (CMSs), the need for a library reserves platform that is independent from an…
Descriptors: Electronic Libraries, Archives, Case Studies, Academic Libraries
Habib, Muhammad Nauman; Jamal, Waseef; Khalil, Uzma; Khan, Zunnoorain – Education and Information Technologies, 2021
The purpose of this research was to understand the automation of Higher Education Institutes (HEIs), and to evaluate the automated process from the perspective of developing country. A single case study of City University of Science and Information Technology (CUSIT), Pakistan was selected as a unit of analysis. Mix methodology was used in this…
Descriptors: Automation, Higher Education, Universities, Technology Uses in Education
Mannino, Michael V.; Khojah, Mohammed; Gregg, Dawn G. – Journal of Information Systems Education, 2021
This paper describes an innovative approach for teaching the challenges in the management of data warehouse development. The approach contains lecture material providing conceptual background about the management of data warehouse development, a simulation game supporting experiential learning, and a post-play debriefing to support synthesis of…
Descriptors: Game Based Learning, Simulation, Data Analysis, Teaching Methods
Grepon, Benzar Glen S.; Baran, Niño T.; Gumonan, Kenn Migan Vincent C.; Martinez, Aldwin Lester M.; Lacsa, Mona Liel E. – Online Submission, 2021
Purpose: Colleges and Universities have been established to provide educational services to the people. Like any other organization, the school has processes and procedures similar to business or industry that involve admissions, processing of data, and generation of reports. Those processes are made possible through a centralized system in…
Descriptors: Program Design, Program Implementation, College Administration, Community Colleges
Fleming, Grace; Massengale, CoCo; Auchstetter, Amelia – Texas Comprehensive Center, 2018
In Texas, Title I schools that have reached achievement levels well above what was expected given their levels of poverty, receive official designations as Reward Schools for demonstrating high academic performance, high academic progress, or both. In 2014, the Texas Education Agency (TEA) partnered with the Texas Comprehensive Center (TXCC) at…
Descriptors: Academic Achievement, Poverty, High Achievement, Disadvantaged Schools
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Lin, Charlie; Yu, Wei-Chieh Wayne; Wang, Jenny – World Journal of Education, 2014
Cloud computing technologies, such as Google Docs, Adobe Creative Cloud, Dropbox, and Microsoft Windows Live, have become increasingly appreciated to the next generation digital learning tools. Cloud computing technologies encourage students' active engagement, collaboration, and participation in their learning, facilitate group work, and support…
Descriptors: Educational Technology, Technology Uses in Education, Information Storage, Information Management
Data Quality Campaign, 2014
Education data can empower educators, students, parents, and policymakers with the information they need to make the best decisions to improve student achievement, information that can move the nation toward an education system in which every student graduates prepared for college and career. Safeguarding the privacy of student data is a critical…
Descriptors: Data, Misconceptions, Privacy, Student Records
Shoham, Idan – Campus Technology, 2011
An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…
Descriptors: Best Practices, Access to Information, Technology Planning, Information Management
Oder, Karl; Pittman, Stephanie – Research Management Review, 2015
Companies purchase computer systems to make their processes more efficient through automation. Some academic medical centers (AMC) have purchased computer systems for their institutional review boards (IRB) to increase efficiency and compliance with regulations. IRB computer systems are expensive to purchase, deploy, and maintain. An AMC should…
Descriptors: Efficiency, Compliance (Legal), Cost Effectiveness, Automation
Milovich, Michael, Jr.; Nicholson, Jennifer A.; Nicholson, Darren B. – Journal of Information Systems Education, 2020
Within the ever-changing technology and business landscape, it is imperative that students develop skills in identifying and leveraging emerging technologies to create business value in innovative and novel ways. Drawing on the Net-enabled Business Innovation Cycle framework, applied learning techniques, and current events, we developed an…
Descriptors: Technological Advancement, Management Information Systems, Computer Science Education, Business Administration Education

Peer reviewed
Direct link
