NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1,561 to 1,575 of 12,776 results Save | Export
LaMacchia, Carolyn – ProQuest LLC, 2013
Technological advances have led to the generation of large databases of organizational data recognized as an information-rich, strategic asset for internal analysis and sharing with trading partners. Data mining techniques can discover patterns in large databases including relationships considered strategically relevant to the owner of the data.…
Descriptors: Data Analysis, Privacy, Heuristics, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Fink, Elian; Patalay, Praveetha; Sharpe, Helen; Wolpert, Miranda – Journal of Educational Psychology, 2018
A great deal of bullying behavior takes place at school, however, existing literature has predominantly focused on individual characteristics of children associated with bullying with less attention on school-level factors. The current study, comprising 23,215 children (51% boys) recruited from Year 4 or Year 5 (M = 9.06 years, SD = 0.56 years)…
Descriptors: Bullying, Student Behavior, Elementary School Students, Predictor Variables
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ilic, Ulas; Haseski, Halil Ibrahim; Tugtekin, Ufuk – Contemporary Educational Technology, 2018
The current study aimed to review studies on computational thinking (CT) indexed in Web of Science (WOS) and ERIC databases. A thorough search in electronic databases revealed 96 studies on computational thinking which were published between 2006 and 2016. Studies were exposed to a quantitative content analysis through using an article control…
Descriptors: Trend Analysis, Educational Trends, Periodicals, Databases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Vasilache, Simona – Universal Journal of Educational Research, 2016
Computer literacy education is an integral part of early university education (it often starts at the high school level). A wide variety of university course structures and teaching styles exist and, at the same time, the knowledge levels of incoming students are varied. This issue is even more pressing in an international environment. This paper…
Descriptors: Computer Literacy, Student Attitudes, Teaching Styles, Global Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Francis, Rosanna; Hawes, David J.; Abbott, Maree – Exceptional Children, 2016
Using a systematic search strategy in which intellectual giftedness was operationalized in terms of IQ score, the authors examined evidence from studies reporting on associations between this aspect of giftedness and psychopathology. A total of 18 studies met the inclusion criteria: compared gifted (IQ = 125) and nongifted (IQ = 90-110) peers or…
Descriptors: Intelligence Quotient, Children, Adolescents, Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Goldschmidt, Ronaldo; Fernandes de Souza, Isabel; Norris, Monica; Passos, Claudio; Ferlin, Claudia; Cavalcanti, Maria Claudia; Soares, Jorge – Informatics in Education, 2016
The use of computers as teaching and learning tools plays a particularly important role in modern society. Within this scenario, Brazil launched its own version of the "One Laptop per Child" (OLPC) program, and this initiative, termed PROUCA, has already distributed hundreds of low-cost laptops for educational purposes in many Brazilian…
Descriptors: Data Collection, Data Analysis, Computer Uses in Education, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Magdin, Martin – Turkish Online Journal of Educational Technology - TOJET, 2016
In the last decade, e-learning has been a standard part of the educational process at all types of schools--primary, secondary, and high schools. When used, e-learning can achieve significant savings not only in terms of time as well as operating costs. However, e-learning is also often criticized. This is mainly due to direct absence of teachers…
Descriptors: Electronic Learning, Notetaking, Courseware, Usability
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Li, Jieyu; Huang, Chunlan; Wang, Xiuhong; Wu, Shengli – Information Research: An International Electronic Journal, 2016
Introduction: In the big data age, we have to deal with a tremendous amount of information, which can be collected from various types of sources. For information search systems such as Web search engines or online digital libraries, the collection of documents becomes larger and larger. For some queries, an information search system needs to…
Descriptors: Search Engines, Data Processing, Database Management Systems, Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Slater, Stephanie J.; Tatge, Coty B.; Bretones, Paulo S.; Slater, Timothy F.; Schleigh, Sharon P.; McKinnon, David; Heyer, Inge – Journal of Astronomy & Earth Sciences Education, 2016
There is widespread interest among discipline-based science education researchers to situate their research in the existing scholarly literature base. Unfortunately, traditional approaches to conducting a thorough literature review are unduly hindered in astronomy education research as the venues in which scholarship is reported are fragmented and…
Descriptors: Astronomy, Science Education, Educational Research, Doctoral Dissertations
Peer reviewed Peer reviewed
Direct linkDirect link
Tomaszewski, Robert – Journal of Chemical Education, 2016
Critical thinking and analytical problem-solving skills in research involves using different search strategies. A proposed concept for an "Imploded Boolean Search" combines three unique identifiable field types to perform a search: keyword(s), numerical value(s), and a chemical structure or reaction. The object of this type of search is…
Descriptors: Undergraduate Study, College Science, Chemistry, Case Studies
Ahluwalia, Madhu V. – ProQuest LLC, 2011
In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…
Descriptors: Databases, Information Security, Data, Information Retrieval
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Letkowski, Jerzy – Journal of Instructional Pedagogies, 2014
Design, development and explorations of databases are popular topics covered in introductory courses taught at business schools. Microsoft Access is the most popular software used in those courses. Despite quite high complexity of Access, it is considered to be one of the most friendly database programs for beginners. A typical Access textbook…
Descriptors: Computer Software, Technology Uses in Education, Business Administration Education, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Petscher, Yaacov; Logan, Jessica A. R. – Child Development, 2014
Linear regression analysis is one of the most common techniques applied in developmental research, but only allows for an estimate of the average relations between the predictor(s) and the outcome. This study describes quantile regression, which provides estimates of the relations between the predictor(s) and outcome, but across multiple points of…
Descriptors: Regression (Statistics), Evaluation Methods, Databases, Longitudinal Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Vessey, Judith; Strout, Tania D.; DiFazio, Rachel L.; Walker, Allison – Journal of School Health, 2014
Background: Bullying is a significant problem in schools and measuring this concept remains problematic. The purposes of this study were to (1) identify the published self-report measures developed to assess youth bullying; (2) evaluate their psychometric properties and instrument characteristics; and (3) evaluate the quality of identified…
Descriptors: Bullying, Psychometrics, Measures (Individuals), Databases
Faix, Allison – Association Supporting Computer Users in Education, 2014
In their 1994 article, "The Politics of the Interface: Power and its Exercise in Electronic Contact Zones," compositionists Cynthia Selfe and Richard Selfe give examples of how certain features of word processing software and other programs used in writing classrooms (including their icons, clip art, interfaces, and file structures) can…
Descriptors: Bibliographic Databases, Academic Libraries, Search Engines, Educational Technology
Pages: 1  |  ...  |  101  |  102  |  103  |  104  |  105  |  106  |  107  |  108  |  109  |  ...  |  852