Publication Date
| In 2026 | 0 |
| Since 2025 | 62 |
| Since 2022 (last 5 years) | 277 |
| Since 2017 (last 10 years) | 772 |
| Since 2007 (last 20 years) | 2165 |
Descriptor
Source
Author
| McClure, Charles R. | 16 |
| Bryant, Rebecca | 9 |
| Penrod, James I. | 9 |
| Telem, Moshe | 9 |
| Glover, Robert H. | 8 |
| Lavoie, Brian | 8 |
| Thomas, Charles R. | 8 |
| Bozeman, William C. | 7 |
| Groff, Warren H. | 7 |
| Howard, Richard D. | 7 |
| Johnson, L. | 7 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 513 |
| Administrators | 358 |
| Policymakers | 114 |
| Researchers | 104 |
| Teachers | 98 |
| Media Staff | 74 |
| Students | 18 |
| Support Staff | 8 |
| Community | 6 |
| Parents | 5 |
| Counselors | 4 |
| More ▼ | |
Location
| Australia | 118 |
| California | 98 |
| United States | 88 |
| Canada | 84 |
| Texas | 79 |
| United Kingdom | 79 |
| Florida | 55 |
| Pennsylvania | 45 |
| Illinois | 44 |
| New York | 44 |
| Ohio | 44 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
Anil Singh; Vikram Bhadauria; Lysette Margaret D'souza; Vimlesh Prabhu Desai – Decision Sciences Journal of Innovative Education, 2025
Supply chain disruptions can lead to shortages. To manage this risk, companies often adopt a customer segmentation strategy to prioritize customers when confirming orders. To protect the limited supply for important customers, strategic segments are created, where some segments are given priority at the expense of other segments. In enterprise…
Descriptors: Supply and Demand, Information Management, Risk, Consumer Economics
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Jamal Eddine Rafiq; Abdelwahed Namir; Abdelali Zakrani; Mohammed Amraouy; Abdellah Bennane – Journal of Educators Online, 2025
This study examines the evolution of educational practices in the digital era and the integration of information technologies in teaching. Through an automated search in six digital libraries, we identified 99 relevant studies spanning the period from 1990 to 2021. We draw on a systematic mapping approach to classify these studies for better…
Descriptors: Educational Development, Educational Practices, Information Technology, Artificial Intelligence
Rosa R. Soto Ruidias; Bernardo Pereira Nunes; Ruben Manrique; Sean Siqueira – Journal of Learning Analytics, 2025
Despite the increasing availability of data used to inform educational policies and practices, concerns persist regarding its quality and accessibility. This study surveys quality education data from Brazil, Colombia, and Peru and evaluates their alignment with the FAIR principles and availability to support academic analytics (AA) and learning…
Descriptors: Foreign Countries, Educational Quality, Learning Analytics, Educational Research
Corrado Matta; Jannika Lindvall; Andreas Ryve – American Journal of Evaluation, 2024
In this article, we discuss the methodological implications of data and theory integration for Theory-Based Evaluation (TBE). TBE is a family of approaches to program evaluation that use program theories as instruments to answer questions about whether, how, and why a program works. Some of the groundwork about TBE has expressed the idea that a…
Descriptors: Data Analysis, Theories, Program Evaluation, Information Management
Nicholas Kofi Akortia Hagan – ProQuest LLC, 2024
Entity Resolution (ER) has been one of the bedrocks in the creation of information systems by ensuring ambiguous entities are identified and resolved by linking. One common design approach of traditional ER systems is to run in single-threaded mode, which makes the system prone to out-of-memory error when processing larger datasets. The Data…
Descriptors: Information Systems, Multivariate Analysis, Information Management, Computer System Design
David Dreyfus – Decision Sciences Journal of Innovative Education, 2024
This research demonstrates a method to introduce blockchain technology in the classroom based on the Proof of Attendance Protocol (POAP). A blockchain is a digital distributed ledger with the potential to improve transparency and trust between parties. Businesses are testing, piloting, and deploying blockchain technology across their…
Descriptors: Supply and Demand, Information Management, Technology Uses in Education, Attendance
Dwi Oktaria Sari; Raniasa Putra; Alamsyah Alamsyah – Journal of Education and Learning (EduLearn), 2024
Indonesian universities are implementing various strategies to improve the quality and quantity of scientific publications. Sriwijaya University has restructured its research and community service grant services by implementing e-services through the new generation management information system of the institute of research and community service…
Descriptors: Foreign Countries, Research, College Faculty, Faculty Publishing
Janja Komljenovic; Kean Birch; Sam Sellar; Annika Bergviken Rensfeldt; Joe Deville; Charlie Eaton; Lesley Gourlay; Morten Hansen; Niels Kerssens; Anne Kovalainen; Pier-Luc Nappert; Joe Noteboom; Lluis Parcerisa; Juan Pable Pardo-Guerra; Seppo Poutanen; Susan Robertson; David Tyfield; Ben Williamson – Discourse: Studies in the Cultural Politics of Education, 2025
Higher education is already profoundly digitalised. Students, academics, and university administrators routinely use digital technologies, many of which rely on data, including artificial intelligence. Universities aim to operate as data-powered organisations to support institutional efficiency and the personalisation of learning and student…
Descriptors: Higher Education, Technology Uses in Education, Educational Technology, Workshops
Spybrook, Jessaca; Maynard, Rebecca; Anderson, Dustin – Prevention Science, 2022
The practice of prospectively registering the details of intervention studies in a public database or registry is gaining momentum across disciplines as a strategy for increasing the transparency, credibility, and accessibility of study findings. In this article, we consider five registries that may be relevant for registration of intervention…
Descriptors: Intervention, Educational Research, Prevention, Sciences
Wihbey, John P. – ProQuest LLC, 2023
Effectively building, coordinating, and enhancing large, decentralized networks of professionals remains a vexing challenge, despite the rise of digital tools and social media platforms. This study examines the evolution of a nascent research- and policy-focused network, spanning more than 60 university groups and policy institutes in the United…
Descriptors: Networks, Research, Program Evaluation, Leadership
Adegoke Oke; John Serbe Marfo; Thomas Kull; Dale Rogers; Afia Frimpomaa Asare Marfo; Mohammed Hassan Noor; SudHanshu Mishra; Bridget McHenry; Sharmila Raj – Decision Sciences Journal of Innovative Education, 2024
The use of gamification to enhance learning in education has been well documented. However, little is known about whether gamification can impact supply chain management knowledge and behaviors among healthcare professionals. In this study, we tested the effectiveness of a simulation app (ShipShape) designed and developed to gamify the fundamental…
Descriptors: Instructional Effectiveness, Gamification, Supply and Demand, Information Management
Porter, Cody Normitta; Taylor, Rachel; Harvey, Adam Charles – Applied Cognitive Psychology, 2022
This study investigates the Asymmetric Information Management (AIM) technique's ability to detect fraudulent insurance claims submitted online. The AIM instructions inform claimants that, inter alia, more detailed statements are easier to accurately classify as genuine or fabricated. To test this, truth tellers (n = 55) provided an honest…
Descriptors: Information Management, Identification, Deception, Insurance
Ayhan Duygulu; Sibel Dogan; Sevgi Yildiz – Journal of Theoretical Educational Science, 2025
The purpose of this study is to develop a valid and reliable scale to determine and evaluate the different dimensions of data literacy at school. The study is a quantitative descriptive survey model. The sampling for exploratory factor analysis was formed of 307 and confirmatory factor analysis 338 teachers and school administrators who are on…
Descriptors: Data, Literacy, Test Construction, Measures (Individuals)
Emmanuel C. Asogwa; Dunka D. Bakwa; Josephine O. Okpe; Jonathan Olelewe Chijioke – African Educational Research Journal, 2025
The integration of Information Technology (IT) in administrative settings has significantly enhanced management efficiency, minimized paperwork, and facilitated faster and more accurate service delivery. Despite these benefits, many administrative officers in higher education institutions still underutilize or neglect the adoption of networking…
Descriptors: College Administration, Administrator Effectiveness, Information Technology, Computer Networks

Peer reviewed
Direct link
