Publication Date
| In 2026 | 3 |
| Since 2025 | 250 |
| Since 2022 (last 5 years) | 1740 |
| Since 2017 (last 10 years) | 4269 |
| Since 2007 (last 20 years) | 10762 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 666 |
| Researchers | 462 |
| Teachers | 399 |
| Administrators | 132 |
| Policymakers | 103 |
| Students | 89 |
| Media Staff | 82 |
| Parents | 21 |
| Counselors | 19 |
| Community | 11 |
| Support Staff | 6 |
| More ▼ | |
Location
| Australia | 420 |
| United Kingdom | 321 |
| Canada | 308 |
| United States | 293 |
| Turkey | 264 |
| California | 225 |
| United Kingdom (England) | 203 |
| China | 201 |
| Germany | 169 |
| Spain | 145 |
| Netherlands | 142 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 4 |
| Meets WWC Standards with or without Reservations | 5 |
| Does not meet standards | 6 |
Antonacopoulou, Elena P. – Journal of Management Education, 2016
In "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory," authors J.B. Arbaugh, Charles J. Fornaciari, and Alvin Hwang ("Journal of Management Education," December 2016 vol. 40 no. 6 p654-691, see EJ1118407) used citation analysis to track the development of…
Descriptors: Business Administration Education, Theories, Educational Research, Classification
Bridgman, Todd; Bell, Emma – Journal of Management Education, 2016
In this rejoinder to Arbaugh et al. (2016), the authors write that they want to reflect critically on two assumptions Arbaugh et al. make about what constitutes successful academic fields. They suggest: (1) such fields have taken-for-granted knowledge that forms the foundation that future research can build on; and (2) they have a high degree of…
Descriptors: Business Administration Education, Theories, Educational Research, Classification
Gerring, John; Cojocaru, Lee – Sociological Methods & Research, 2016
This study revisits the task of case selection in case study research, proposing a new typology of strategies that is explicit, disaggregated, and relatively comprehensive. A secondary goal is to explore the prospects for case selection by "algorithm," aka "ex ante," "automatic," "quantitative,"…
Descriptors: Case Studies, Selection, Research Design, Social Science Research
Eisenberg, Nancy; VanSchyndel, Sarah K.; Spinrad, Tracy L. – Child Development, 2016
Because motivations for prosocial actions typically are unclear, sometimes even to actors but especially for observers, it is difficult to study prosocial motivation. This article reviews research that provides evidence regarding children's motives for prosocial behaviors. First, we present a heuristic model to classify motives on the dimension of…
Descriptors: Motivation, Prosocial Behavior, Literature Reviews, Heuristics
Hung, Ruyu – Educational Philosophy and Theory, 2016
In Confucianism, the subject of learning is one of the most important concerns. For centuries, Confucian thinkers have been devoted to seeking answers to questions such as, how to be a morally noble and decent human being? (??), how to be a true and moral human being--a noble man? (junzi, ??) and how to learn to be a junzi? A "junzi" can…
Descriptors: Confucianism, Criticism, Epistemology, Classification
Cox, Richard G. – Teaching Statistics: An International Journal for Teachers, 2016
This classroom activity is designed to help students practice calculating percentiles. The approach of the activity involves physical sorting and full classroom participation in each calculation. The design encourages a more engaged approach than simply having students make a calculation with numbers on a paper.
Descriptors: Statistics, Class Activities, Learning Activities, Computation
Markus, Keith A. – Measurement: Interdisciplinary Research and Perspectives, 2016
In their 2016 work, Aguirre-Urreta et al. provided a contribution to the literature on causal measurement models that enhances clarity and stimulates further thinking. Aguirre-Urreta et al. presented a form of statistical identity involving mapping onto the portion of the parameter space involving the nomological net, relationships between the…
Descriptors: Causal Models, Measurement, Criticism, Concept Mapping
Abisheva, Klara M.; Dossanova, Altynay Zh.; Ismakova, Bibissara S.; Aupova, Gulbagira K.; Ayapbergenov, Bulat K.; Tlegenova, Kulyan A. – International Journal of Environmental and Science Education, 2016
The aim of the research is to determine the peculiarities of the evaluative categorization of human intelligence in linguistic world images. The study describes the interdisciplinary approach to studying evaluative categorization, which assumes the use of complex methodology including the anthropocentric, the interdisciplinary, and the cognitive…
Descriptors: Classification, Interdisciplinary Approach, Cognitive Processes, Ethnicity
Sen, Sedat – Creativity Research Journal, 2016
Previous research using creativity assessments has used latent class models and identified multiple classes (a 3-class solution) associated with various domains. This study explored the latent class structure of the Runco Ideational Behavior Scale, which was designed to quantify ideational capacity. A robust state-of the-art technique called the…
Descriptors: Item Response Theory, Middle School Students, Classification, Creativity Tests
Bodomo, Adams – Advances in Language and Literary Studies, 2016
What is the most prototypical form of African literature? Shouldn't we be using African languages to produce African literary texts, shouldn't we produce more Afriphone African literature compared to Europhone African literature or Afro-Europhone literature? This issue underlies the reality that the vast majority of African writers presumably…
Descriptors: African Culture, African Languages, Literature, Indo European Languages
von Davier, Matthias – ETS Research Report Series, 2016
This report presents results on a parallel implementation of the expectation-maximization (EM) algorithm for multidimensional latent variable models. The developments presented here are based on code that parallelizes both the E step and the M step of the parallel-E parallel-M algorithm. Examples presented in this report include item response…
Descriptors: Psychometrics, Mathematics, Models, Statistical Analysis
Koichu, Boris; Zaslavsky, Orit; Dolev, Lea – Journal of Mathematics Teacher Education, 2016
The goal of the study presented in this article was to examine how variations in task design may affect mathematics teachers' learning experiences. The study focuses on sorting tasks, i.e., learning tasks that require grouping a given set of mathematical items, in as many ways as possible, according to different criteria suggested by the learners.…
Descriptors: Mathematics Teachers, Mathematics Instruction, Geometric Concepts, Secondary School Mathematics
Graham, Susan A.; Gelman, Susan A.; Clarke, Jessica – Developmental Psychology, 2016
We examined whether the distinction between generic and nongeneric language provides toddlers with a rapid and efficient means to learn about kinds. In Experiment 1, we examined 30-month-olds' willingness to extend atypical properties to members of an unfamiliar category when the properties were introduced in 1 of 3 ways: (a) using a generic noun…
Descriptors: Toddlers, Language, Inferences, Novelty (Stimulus Dimension)
Castellani, Tommaso; Valente, Adriana; Cori, Liliana; Bianchi, Fabrizio – Evidence & Policy: A Journal of Research, Debate and Practice, 2016
In this work a meta-policy on health promotion is analysed, through content analysis of documents and interviews to stakeholders, with the aim of understanding the use of evidence and the knowledge conversion process in a multi-actor policy trajectory. We study the different sources of evidence and their interaction. Among our results, we describe…
Descriptors: Evidence, Policy, Health Promotion, Content Analysis
Enfinger, Kerry Wayne – ProQuest LLC, 2016
The number of malicious files present in the public domain continues to rise at a substantial rate. Current anti-malware software utilizes a signature-based method to detect the presence of malicious software. Generating these pattern signatures is time consuming due to malicious code complexity and the need for expert analysis, however, by making…
Descriptors: Artificial Intelligence, Computer Software, Identification, Computer Security

Peer reviewed
Direct link
