NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 9,661 to 9,675 of 21,334 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Wayman, Ian; Kyobe, Michael – Journal of Information Technology Education: Innovations in Practice, 2012
As students in computing disciplines are introduced to modern information technologies, numerous unethical practices also escalate. With the increase in stringent legislations on use of IT, users of technology could easily be held liable for violation of this legislation. There is however lack of understanding of social aspects of computing, and…
Descriptors: Curriculum Development, Information Technology, Foreign Countries, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Furlong, John; Davies, Chris – Oxford Review of Education, 2012
The paper presents findings from a large-scale mixed methods study of young people's uses of new technologies at home to address a number of key conceptual issues in understanding the home as context for learning. First it is argued that young people's engagement with new technologies is fundamentally bound up with their own identity. It then goes…
Descriptors: Informal Education, Young Adults, Youth, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Abdous, M'hammed; Facer, Betty Rose; Yen, Cherng-Jyh – Computers & Education, 2012
With podcasting gaining more mainstream adoption in higher education, it's critical to examine its effectiveness in improving the student learning experience. To this end, this paper examines the effectiveness of podcasts integrated into the curriculum (PIC) versus podcasts as supplemental material (PSM). Considering recent empirical work on the…
Descriptors: Academic Achievement, Program Effectiveness, Comparative Analysis, Learning Experience
Peer reviewed Peer reviewed
Direct linkDirect link
Tsai, Chia-Wen – Education & Training, 2012
Purpose: The author redesigned a course titled "Applied Information Technology: Networking" and applied online collaborative learning (CL) with initiation and self-regulated learning (SRL) to improve students' involvement in this course in an environment that is full of free online games, shopping websites, and social networking…
Descriptors: Computer Assisted Instruction, Computers, Educational Technology, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Violino, Bob – Community College Journal, 2008
This article discusses the enterprise resource planning (ERP) system. Deploying an ERP system is one of the most extensive--and expensive--IT projects a college or university can undertake. The potential benefits of ERP are significant: a more smoothly running operation with efficiencies in virtually every area of administration, from automated…
Descriptors: Information Services, Higher Education, Information Technology, Surveys
Bolch, Matt – Technology & Learning, 2008
For the school chief information officer (CIO), safeguarding students and facilities is as much a part of the job description as keeping the data networks running and the servers protected from hackers. This article describes how two districts, Miami-Dade County Public Schools and Taos Municipal Schools, secured their surveillance systems. The…
Descriptors: Public Schools, Occupational Information, Information Technology, Administrators
Peer reviewed Peer reviewed
Direct linkDirect link
Cheng, Kai-Wen; Chen, Yu-Fen – Journal of Instructional Psychology, 2008
Many people may think knowledge management is only applicable to enterprises. In fact, the inventor of knowledge management, Peter F. Drucker (2000), once stated that knowledge management can also be applied to schools and the major difference lies in the nature of how things are managed rather than what principles or norms are applied.…
Descriptors: Knowledge Management, Hospitality Occupations, Technical Institutes, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Harold, III; Smarkusky, Debra; Corrigall, Elizabeth – Journal of Information Systems Education, 2008
Industry has indicated the desire for academic programs to produce graduates that are well-versed in collaborative problem solving and general project management concepts in addition to technical skills. The primary focus of a curriculum is typically centered on the technical training with minimal attention given to coalescing team and project…
Descriptors: Problem Solving, Problem Based Learning, Information Technology, Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Morris, Steven A. – Journal of Information Systems Education, 2008
The Remote Services, Inc. (RSI) case is designed as an extensible, database design and implementation project. The case is designed in two primary components: design and implementation. The design component of the case allows students to evaluate a scenario that is similar to a real-world business situation and create an appropriate design…
Descriptors: Database Design, Evaluation, Computers, Consultants
Peer reviewed Peer reviewed
Direct linkDirect link
Simkin, Mark G. – Journal of Information Systems Education, 2008
Data-validation routines enable computer applications to test data to ensure their accuracy, completeness, and conformance to industry or proprietary standards. This paper presents five programming cases that require students to validate five different types of data: (1) simple user data entries, (2) UPC codes, (3) passwords, (4) ISBN numbers, and…
Descriptors: Computers, Computer Oriented Programs, Programming, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Chang; Mackie, Brian G. – Journal of Information Systems Education, 2008
Throughout the last decade, companies have increased their investment in electronic commerce (EC) by developing and implementing Web-based applications on the Internet. This paper describes a class project to develop a customized computer website which is similar to Dell Computer Corporation's (Dell) website. The objective of this project is to…
Descriptors: Class Activities, Internet, Business, Web Sites
Grossklags, Jens – ProQuest LLC, 2009
Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…
Descriptors: Economic Research, Probability, Internet, Computer Security
Elci, Nuray – ProQuest LLC, 2009
Globalization and direction toward a knowledge economy, along with an economic downturn, is creating a competitive environment that calls for corporations to become more innovative. As the business environment becomes more competitive and dynamic, corporations are looking for new ways of achieving innovation. Open innovation is one approach that…
Descriptors: Global Approach, Innovation, Corporations, Evaluation Methods
Williams, Bernard L. – ProQuest LLC, 2009
Every year, organizations lose millions of dollars due to IT (Information Technology) project failures. Over time, organizations have developed processes and procedures to help reduce the incidence of challenged IT projects. Research has shown that IT project processes can work to help reduce the number of challenged projects. The research in this…
Descriptors: Information Technology, Organizational Theories, Case Studies, Predictor Variables
Lapham, John Edmund – ProQuest LLC, 2009
The Federal Government continues to implement enterprise systems (information and communication technology solutions) as part of reinvention and business transformation. Enterprise system implementations are complex, costly, and often under achieving endeavors requiring that effective public leaders engage and influence the sociotechnical projects…
Descriptors: Organizational Change, Data Analysis, Leadership, Federal Government
Pages: 1  |  ...  |  641  |  642  |  643  |  644  |  645  |  646  |  647  |  648  |  649  |  ...  |  1423