NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 19,726 to 19,740 of 21,300 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Coakes, Elayne – Learning Organization, 2006
Purpose: The purpose of this paper is to indicate and illustrate the potential for use of different types of technologies to support knowledge process in transnational organisations. Design/methodology/approach: The paper uses a standard literature review plus illustrations from case organisations to demonstrate the potential applications and…
Descriptors: Knowledge Management, Shared Resources and Services, Global Approach, International Organizations
Peer reviewed Peer reviewed
Direct linkDirect link
Lang, Janell B. – Community College Journal, 2004
This article takes a closer look at emerging fields in the allied health arena. The relatively new field of Health Information Technology is one of the exciting prospects, surging with growth opportunities. These individuals are medical language experts who interpret, process, store and retrieve health information for research and data collection.…
Descriptors: Food Service, Terrorism, National Security, Allied Health Personnel
Peer reviewed Peer reviewed
Direct linkDirect link
Hampel, Regine; Hauck, Mirjam – Language Learning & Technology, 2004
In order to respond to learners' need for more flexible speaking opportunities and to overcome the geographical challenge of students spread over the United Kingdom and continental Western Europe, the Open University recently introduced Internet-based, real-time audio conferencing, thus making a groundbreaking move in the distance learning and…
Descriptors: Computer Mediated Communication, Open Universities, Distance Education, Tutor Training
Peer reviewed Peer reviewed
Direct linkDirect link
Richards, Cameron – Language Learning & Technology, 2005
Despite the imperatives of policy and rhetoric about their integration in formal education, Information and Communication Technologies (ICTs) are often used as an "add-on" in many classrooms and in many lesson plans. Nevertheless, many teachers find that interesting and well-planned tasks, projects, and resources provide a key to…
Descriptors: Introductory Courses, Teaching Methods, Information Technology, Computer Assisted Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Peter, Yvan; Vantroys, Thomas – Educational Technology & Society, 2005
This article deals with providing support for the execution of pedagogical scenarios in Learning Management Systems. It takes an engineering point of view to identifies actors, design and use processes. Next it defines the necessary capabilities of a platform so that actors can manage or use pedagogical scenarios. The second part of the article is…
Descriptors: Computer Software, Distance Education, Integrated Learning Systems, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Berry, Kevin; O'Bryan, David; Cummings, Maeve – Journal of Information Technology Education, 2004
The demand for information technology (IT) or information systems (IS) personnel remains strong, despite the cyclical downturn in the technology industry. The field continues to offer good salaries, challenge, and high levels of job satisfaction. The IS profession needs to attract the best and brightest students to the field to satisfy the needs…
Descriptors: Majors (Students), Information Systems, Information Technology, Business Education Teachers
Peer reviewed Peer reviewed
Direct linkDirect link
Wallace, Patricia; Clariana, Roy B. – Journal of Information Technology Education, 2005
Many colleges and universities require incoming students to demonstrate a prescribed level of computer proficiency. Currently, many educational institutions offer introductory computer courses to assist students in meeting this requirement. Other institutions are considering eliminating introductory computer courses with the expectation that…
Descriptors: Required Courses, Computer Software, Information Systems, Course Content
Peer reviewed Peer reviewed
Direct linkDirect link
Markauskaite, Lina – Australasian Journal of Educational Technology, 2006
Gender differences in self reported ICT experience and ICT literacy among first year graduate trainee teachers were investigated. Using a dynamic model, three main components of aspiring teachers' ICT literacy were covered: (1) present general problem solving and technical ICT capabilities; (2) situational and longitudinal sustainability, and (3)…
Descriptors: Student Teachers, Graduate Students, Females, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Burnip, Lindsay – Australasian Journal of Educational Technology, 2006
Course delivery mediated by information and communication technology (ICT) is increasingly seen as a desirable and cost effective means of providing study opportunities to large numbers of teachers. However, it is unclear to what extent teachers have access to the ICT infrastructure that is required for participation in such study. This paper…
Descriptors: Technical Support, Teacher Characteristics, Information Technology, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chinnappan, Mohan – Mathematics Teacher Education and Development, 2003
Recent developments about cognitions underlying mathematical learning are beginning to suggest that the activation and appropriate use of prior knowledge by students is, to a large measure, controlled by the quality of organisation of that knowledge. Thus, teaching needs to support the construction of well-connected mathematical knowledge. An…
Descriptors: Schemata (Cognition), Preservice Teacher Education, Teacher Education Programs, Student Teachers
Yen, Ng Lee; Bakar, Kamariah Abu; Roslan, Samsilah; Luan, Wong Su; Abd Rahman, Petri Zabariah Mega – International Education Journal, 2005
This study sought to uncover the predictors of self-regulated learning in Malaysian smart schools. The sample consisted of 409 students, from six randomly chosen smart schools. A quantitative correlational research design was employed and the data were collected through survey method. Six factors were examined in relation to the predictors of…
Descriptors: Surveys, Student Motivation, Multiple Regression Analysis, Information Literacy
Jha, Swati; Chatterjee, Shiffon – International Education Journal, 2005
In developing countries like India, the onus of development lies mainly with the government, which faces the predicament of multiple demands and limited resources. This leads to a situation where even fundamental objectives such as basic literacy for all are not met. On the other hand, there exists a vibrant private sector, which has resources and…
Descriptors: Private Sector, Access to Computers, Information Technology, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Waterhouse, Shirley; Rogers, Rodney O. – EDUCAUSE Quarterly, 2004
Most professionals interested in the use of technology in education understand the importance of an e-learning course site, whether the course is taught totally online or in a hybrid environment where the instructor has some face-to-face contact with students. However, many instructors have not thoroughly considered the importance of posting…
Descriptors: Copyrights, Online Courses, Privacy, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Perry, Claudia A. – EDUCAUSE Quarterly, 2004
Information technology infuses all aspects of modern life, and the growth of digital information continues at an unprecedented rate. Widely influential documents, such as the National Research Council's "Being Fluent with Information Technology" and the American Library Association's "Information Literacy Competency Standards for Higher…
Descriptors: Higher Education, Educational Philosophy, Information Technology, Information Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Pages: 1  |  ...  |  1312  |  1313  |  1314  |  1315  |  1316  |  1317  |  1318  |  1319  |  1320  |  ...  |  1420