NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1,336 to 1,350 of 5,948 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ishikawa, Yuka – Themes in Science and Technology Education, 2010
Innovative computer technology has sparked a revolutionary change in the area of language analysis. Individual researchers are increasingly likely to access huge corpora containing several hundred million words and to analyze the data using highly developed language analyzers via the Internet. Sketch Engine is one of such online language…
Descriptors: Japanese, Internet, Linguistics, Information Technology
Dragut, Eduard Constantin – ProQuest LLC, 2010
An increasing number of Web sites expose their content via query interfaces, many of them offering the same type of products/services (e.g., flight tickets, car rental/purchasing). They constitute the so-called "Deep Web". Accessing the content on the Deep Web has been a long-standing challenge for the database community. For a user interested in…
Descriptors: Internet, Web Sites, Search Engines, Information Retrieval
Wrenn, Jesse – ProQuest LLC, 2010
In order to ease the burden of electronic note entry on physicians, electronic documentation support tools have been developed to assist in note authoring. There is little evidence of the effects of these tools on attributes of clinical documentation, including document quality. Furthermore, the resultant abundance of duplicated text and…
Descriptors: Physicians, Documentation, Computation, Redundancy
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Paul; Ng, Chen Kee; Lim, Gloria – British Journal of Educational Technology, 2010
The need, use, benefit and potential of e-portfolios have been analysed and discussed by a substantial body of researchers in the education community. However, the development and implementation approaches of e-portfolios to date have faced with various challenges and limitations. This paper presents a new approach of an e-portfolio system design…
Descriptors: Portfolios (Background Materials), Information Management, Computer Software, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Saas, Tyler; Kemp, James – Research Management Review, 2017
Deloitte Consulting LLP conducted a review of publicly available data sources with the goal of identifying the pre- and post-award systems used in higher education. The number and type of pre- and post-award systems identified not only show that higher education institutions (HEIs) use a variety of methods to facilitate research activities, but…
Descriptors: Research Administration, Higher Education, Awards, Primary Sources
Peer reviewed Peer reviewed
Direct linkDirect link
Hugo, A. J. – Africa Education Review, 2012
This article reports on research that was done about the way in which institutions of higher education in Namibia respond to the needs of students with disabilities. Five categories emanated from the data, namely prevalence of disability; management of disability-related data by institutions of higher education; modes of identification and…
Descriptors: Foreign Countries, College Students, Special Needs Students, Disabilities
Borkowski, Tammy M. – ProQuest LLC, 2012
The United States Government relies on information technology to provide services to its citizens, spending more than $600 billion on its products and services in the last decade. Given the current fiscal climate, the Executive Branch of the United States Government has a renewed focus on information technology (IT) innovation, requiring federal…
Descriptors: Emotional Intelligence, Leadership Responsibility, Emotional Development, Competence
Peer reviewed Peer reviewed
Direct linkDirect link
Chu, Samuel K. W.; Kwan, Alvin C. M.; Warning, Peter – Educational Technology & Society, 2012
The functions and possibilities afforded by blogging have been suggested to be relevant to learning and information management. Its increasing use in the business and education sectors is documented, but currently its use in professional education or internship is limited. The social nature of blogging appears to support the applicability of blogs…
Descriptors: Information Management, Evidence, Rating Scales, Professional Education
Yanzick, Paul David – ProQuest LLC, 2009
The use of Service Oriented Architectures, namely web services, has become a widely adopted method for transfer of data between systems across the Internet as well as the Enterprise. Adopting a similar approach to embedded devices is also starting to emerge as personal devices and sensor networks are becoming more common in the industry. This…
Descriptors: Internet, Experiments, Computer System Design, Programming
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Johnson, L.; Adams Becker, S.; Cummins, M.; Estrada V.; Freeman, A.; Ludgate, H. – New Media Consortium, 2013
"The NMC Horizon Report" series is the most visible outcome of the New Media Consortium (NMC) Horizon Project, an ongoing research effort established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. This…
Descriptors: Technology Uses in Education, Educational Technology, Elementary Secondary Education, Technological Advancement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Young, Anne; McConkey, Kevin; Kirby, Mark – Journal of Institutional Research, 2011
Student feedback surveys are an important component of the continuous improvement cycle at the University of Newcastle. This article describes a recently adopted holistic approach to collecting, analysing, reporting and acting on student feedback on courses (units of study), programs (collection of courses leading to an award) and the student…
Descriptors: Student Surveys, Feedback (Response), Holistic Approach, Course Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Larney, Sarah; Burns, Lucy – Evaluation Review, 2011
Individuals in contact with the criminal justice system are a key population of concern to public health. Record linkage studies can be useful for studying health outcomes for this group, but the use of aliases complicates the process of linking records across databases. This study was undertaken to determine the impact of aliases on sensitivity…
Descriptors: Criminals, Public Health, Justice, Institutionalized Persons
Peer reviewed Peer reviewed
Direct linkDirect link
Rodriguez, Sarah L.; Garbee, Kelty T.; Miller, Ryan A.; Saenz, Victor B. – Community College Journal of Research and Practice, 2018
This study explored how administrators at community colleges conceptualized change related to resource allocation and managing competing priorities to support targeted programming for Latino men. The study included the perspectives of 39 administrators from seven community colleges across Texas using concepts associated with institutional change…
Descriptors: Community Colleges, Educational Resources, Resource Allocation, Males
Pages: 1  |  ...  |  86  |  87  |  88  |  89  |  90  |  91  |  92  |  93  |  94  |  ...  |  397