Publication Date
| In 2026 | 0 |
| Since 2025 | 352 |
| Since 2022 (last 5 years) | 2323 |
| Since 2017 (last 10 years) | 5257 |
| Since 2007 (last 20 years) | 12474 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 867 |
| Teachers | 482 |
| Administrators | 480 |
| Media Staff | 267 |
| Policymakers | 260 |
| Researchers | 169 |
| Students | 120 |
| Parents | 32 |
| Support Staff | 16 |
| Community | 13 |
| Counselors | 11 |
| More ▼ | |
Location
| Australia | 819 |
| United Kingdom | 627 |
| United States | 514 |
| Turkey | 438 |
| Canada | 422 |
| China | 329 |
| Spain | 253 |
| South Africa | 248 |
| India | 244 |
| California | 212 |
| United Kingdom (England) | 201 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Coakes, Elayne – Learning Organization, 2006
Purpose: The purpose of this paper is to indicate and illustrate the potential for use of different types of technologies to support knowledge process in transnational organisations. Design/methodology/approach: The paper uses a standard literature review plus illustrations from case organisations to demonstrate the potential applications and…
Descriptors: Knowledge Management, Shared Resources and Services, Global Approach, International Organizations
Lang, Janell B. – Community College Journal, 2004
This article takes a closer look at emerging fields in the allied health arena. The relatively new field of Health Information Technology is one of the exciting prospects, surging with growth opportunities. These individuals are medical language experts who interpret, process, store and retrieve health information for research and data collection.…
Descriptors: Food Service, Terrorism, National Security, Allied Health Personnel
Hampel, Regine; Hauck, Mirjam – Language Learning & Technology, 2004
In order to respond to learners' need for more flexible speaking opportunities and to overcome the geographical challenge of students spread over the United Kingdom and continental Western Europe, the Open University recently introduced Internet-based, real-time audio conferencing, thus making a groundbreaking move in the distance learning and…
Descriptors: Computer Mediated Communication, Open Universities, Distance Education, Tutor Training
Richards, Cameron – Language Learning & Technology, 2005
Despite the imperatives of policy and rhetoric about their integration in formal education, Information and Communication Technologies (ICTs) are often used as an "add-on" in many classrooms and in many lesson plans. Nevertheless, many teachers find that interesting and well-planned tasks, projects, and resources provide a key to…
Descriptors: Introductory Courses, Teaching Methods, Information Technology, Computer Assisted Instruction
Peter, Yvan; Vantroys, Thomas – Educational Technology & Society, 2005
This article deals with providing support for the execution of pedagogical scenarios in Learning Management Systems. It takes an engineering point of view to identifies actors, design and use processes. Next it defines the necessary capabilities of a platform so that actors can manage or use pedagogical scenarios. The second part of the article is…
Descriptors: Computer Software, Distance Education, Integrated Learning Systems, Computer Interfaces
Berry, Kevin; O'Bryan, David; Cummings, Maeve – Journal of Information Technology Education, 2004
The demand for information technology (IT) or information systems (IS) personnel remains strong, despite the cyclical downturn in the technology industry. The field continues to offer good salaries, challenge, and high levels of job satisfaction. The IS profession needs to attract the best and brightest students to the field to satisfy the needs…
Descriptors: Majors (Students), Information Systems, Information Technology, Business Education Teachers
Wallace, Patricia; Clariana, Roy B. – Journal of Information Technology Education, 2005
Many colleges and universities require incoming students to demonstrate a prescribed level of computer proficiency. Currently, many educational institutions offer introductory computer courses to assist students in meeting this requirement. Other institutions are considering eliminating introductory computer courses with the expectation that…
Descriptors: Required Courses, Computer Software, Information Systems, Course Content
Markauskaite, Lina – Australasian Journal of Educational Technology, 2006
Gender differences in self reported ICT experience and ICT literacy among first year graduate trainee teachers were investigated. Using a dynamic model, three main components of aspiring teachers' ICT literacy were covered: (1) present general problem solving and technical ICT capabilities; (2) situational and longitudinal sustainability, and (3)…
Descriptors: Student Teachers, Graduate Students, Females, Online Courses
Burnip, Lindsay – Australasian Journal of Educational Technology, 2006
Course delivery mediated by information and communication technology (ICT) is increasingly seen as a desirable and cost effective means of providing study opportunities to large numbers of teachers. However, it is unclear to what extent teachers have access to the ICT infrastructure that is required for participation in such study. This paper…
Descriptors: Technical Support, Teacher Characteristics, Information Technology, Educational Technology
Chinnappan, Mohan – Mathematics Teacher Education and Development, 2003
Recent developments about cognitions underlying mathematical learning are beginning to suggest that the activation and appropriate use of prior knowledge by students is, to a large measure, controlled by the quality of organisation of that knowledge. Thus, teaching needs to support the construction of well-connected mathematical knowledge. An…
Descriptors: Schemata (Cognition), Preservice Teacher Education, Teacher Education Programs, Student Teachers
Yen, Ng Lee; Bakar, Kamariah Abu; Roslan, Samsilah; Luan, Wong Su; Abd Rahman, Petri Zabariah Mega – International Education Journal, 2005
This study sought to uncover the predictors of self-regulated learning in Malaysian smart schools. The sample consisted of 409 students, from six randomly chosen smart schools. A quantitative correlational research design was employed and the data were collected through survey method. Six factors were examined in relation to the predictors of…
Descriptors: Surveys, Student Motivation, Multiple Regression Analysis, Information Literacy
Jha, Swati; Chatterjee, Shiffon – International Education Journal, 2005
In developing countries like India, the onus of development lies mainly with the government, which faces the predicament of multiple demands and limited resources. This leads to a situation where even fundamental objectives such as basic literacy for all are not met. On the other hand, there exists a vibrant private sector, which has resources and…
Descriptors: Private Sector, Access to Computers, Information Technology, Foreign Countries
Waterhouse, Shirley; Rogers, Rodney O. – EDUCAUSE Quarterly, 2004
Most professionals interested in the use of technology in education understand the importance of an e-learning course site, whether the course is taught totally online or in a hybrid environment where the instructor has some face-to-face contact with students. However, many instructors have not thoroughly considered the importance of posting…
Descriptors: Copyrights, Online Courses, Privacy, Educational Technology
Perry, Claudia A. – EDUCAUSE Quarterly, 2004
Information technology infuses all aspects of modern life, and the growth of digital information continues at an unprecedented rate. Widely influential documents, such as the National Research Council's "Being Fluent with Information Technology" and the American Library Association's "Information Literacy Competency Standards for Higher…
Descriptors: Higher Education, Educational Philosophy, Information Technology, Information Literacy
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration

Peer reviewed
Direct link
