Publication Date
| In 2026 | 0 |
| Since 2025 | 14 |
| Since 2022 (last 5 years) | 93 |
| Since 2017 (last 10 years) | 213 |
| Since 2007 (last 20 years) | 750 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Williams, John; Cowie, Bronwen; Khoo, Elaine; Saunders, Kathy; Taylor, Simon; Otrel-Cass, Kathrin – Teaching and Learning Research Initiative, 2013
This research project aimed to understand and explore the ways electronically networked (e-networked) tools can support authentic science inquiry in junior secondary classrooms in order to address concerns about student engagement in science. The research questions for this study were: (1) What are the existing ideas, experiences and visions that…
Descriptors: Active Learning, Inquiry, Secondary School Science, Learner Engagement
Takashi Nagai; Mizue Kayama; Kazunori Itoh – Interactive Technology and Smart Education, 2014
Purpose: The purpose of this study is to explore a support system for beginners in drawing in a networked environment. Learners can receive advice and assessments from art experts without time and/or place constraints by using the proposed system. The authors investigate the possibilities of online supporting drawing learning. Two key factors are…
Descriptors: Art Education, Freehand Drawing, Computer Graphics, Computer Assisted Instruction
Chetty, Marshini – ProQuest LLC, 2011
Technological infrastructure is often taken for granted in our day to day lives until it breaks down, usually because it invisibly supports tasks otherwise. Previous work in HCI has focused on how people react and deal with breaks in infrastructure as well as how to help people to fix or exploit these breaks. However, few have sought to understand…
Descriptors: Computer Networks, Physical Environment, Family Environment, Computer System Design
Abernathy, David – Journal of Geography, 2011
This article addresses an effort to incorporate wireless sensor networks and the emerging tools of the Geoweb into undergraduate teaching and research at a small liberal arts college. The primary goal of the research was to identify the hardware, software, and skill sets needed to deploy a local sensor network, collect data, and transmit that data…
Descriptors: Computer Networks, Telecommunications, Liberal Arts, Geography Instruction
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2012
A network engineer is an Information Technology (IT) professional who designs, implements, maintains, and troubleshoots computer networks. While the United States is still experiencing relatively high unemployment, demand for network engineers remains strong. To determine what skills employers are looking for, data was collected and analyzed from…
Descriptors: Computer Networks, Engineering Education, Information Technology, Career Development
Hsiao, Ya-Ping; Brouns, Francis; van Bruggen, Jan; Sloep, Peter B. – International Association for Development of the Information Society, 2012
In Learning Networks, learners need to share knowledge with others to build knowledge. In particular, when working on complex tasks, they often need to acquire extra cognitive resources from others to process a high task load. However, without support high task load and organizing knowledge sharing themselves might easily overload learners'…
Descriptors: Foreign Countries, Teaching Skills, Peer Relationship, Social Networks
Papadopoulos, Pantelis M.; Lagkas, Thomas D.; Demetriadis, Stavros N. – Computers & Education, 2012
This study provides field research evidence on the efficiency of a "free-selection" peer review assignment protocol as compared to the typically implemented "assigned-pair" protocol. The study employed 54 sophomore students who were randomly assigned into three groups: Assigned-Pair (AP) (the teacher assigns student works for review to student…
Descriptors: Control Groups, Peer Evaluation, Assignments, Instructional Design
Johnson, Matthew; Riel, Richard; Germain-Froese, Bernie – Canadian Teachers' Federation, 2016
To get a better understanding of how networked technologies are impacting teachers and their teaching practices, in 2015 MediaSmarts partnered with the Canadian Teachers' Federation to survey 4,043 K-12 teachers and school administrators who were teaching in classroom settings across the country. The survey explored the extent to which networked…
Descriptors: Computer Networks, Computer Uses in Education, Foreign Countries, Use Studies
West, Patti; Rutstein, Daisy Wise; Mislevy, Robert J.; Liu, Junhui; Choi, Younyoung; Levy, Roy; Crawford, Aaron; DiCerbo, Kristen E.; Chappel, Kristina; Behrens, John T. – National Center for Research on Evaluation, Standards, and Student Testing (CRESST), 2010
A major issue in the study of learning progressions (LPs) is linking student performance on assessment tasks to the progressions. This report describes the challenges faced in making this linkage using Bayesian networks to model LPs in the field of computer networking. The ideas are illustrated with exemplar Bayesian networks built on Cisco…
Descriptors: Bayesian Statistics, Computer Networks, Evidence, Learning Processes
Foley, Marianne – Journal of Electronic Resources Librarianship, 2012
The absence of a well-defined space for library resources within course-management systems has been well documented in library literature. Academic libraries have sought to remedy this deficiency in numerous ways. This article describes how a "library nugget," or module, was added to the Buffalo State College course-management system,…
Descriptors: Academic Libraries, Management Systems, State Colleges, Library Services
Eriksson, Gillian – Gifted Education International, 2012
"It is the year 2025 and I am compiling this article for an instant VPD (videopod) that is streamed over the world. An EESR (Educational Expert Service Request) came from an empathetic computer HIAS (Hi, I am Sam) that matched my qualifications with a quest by online activists SFT (Searching for Truth) to examine global interactions in…
Descriptors: Video Technology, Global Education, Communication (Thought Transfer), Academically Gifted
Chaputula, Aubrey Harvey – Program: Electronic Library and Information Systems, 2012
Purpose: The purpose of this research is to look at the state, adoption and use of ICTs by students and academic staff at Mzuzu University. Design/methodology/approach: The research used a survey method whose study population included students, academic and library staff. Data for the study were collected using an interview guide and…
Descriptors: Foreign Countries, College Students, College Faculty, Computer Uses in Education
Ouyang, Ye – ProQuest LLC, 2011
Rapid changes in mobile techniques have always been evolutionary, and the deployment of 4G Long Term Evolution (LTE) networks will be the same. It will be another transition from Third Generation (3G) to Fourth Generation (4G) over a period of several years, as is the case still with the transition from Second Generation (2G) to 3G. As a result,…
Descriptors: Telecommunications, Handheld Devices, Computer Networks, Planning
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology

Direct link
Peer reviewed
