Publication Date
| In 2026 | 0 |
| Since 2025 | 368 |
| Since 2022 (last 5 years) | 2339 |
| Since 2017 (last 10 years) | 5273 |
| Since 2007 (last 20 years) | 12490 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 867 |
| Teachers | 482 |
| Administrators | 480 |
| Media Staff | 267 |
| Policymakers | 260 |
| Researchers | 169 |
| Students | 120 |
| Parents | 32 |
| Support Staff | 16 |
| Community | 13 |
| Counselors | 11 |
| More ▼ | |
Location
| Australia | 819 |
| United Kingdom | 627 |
| United States | 515 |
| Turkey | 439 |
| Canada | 422 |
| China | 329 |
| Spain | 253 |
| South Africa | 249 |
| India | 244 |
| California | 212 |
| United Kingdom (England) | 201 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Mariki, Belingtone Eliringia – Turkish Online Journal of Distance Education, 2013
This study was carried out at Hanyang Cyber University (HYCU) in the Republic of Korea. The main purpose of this study was to explore Hanyang Cyber University's experience in the use of ICT in Distance Education (DE) so as to learn best practices that can be adapted by the Institute of Adult Education (IAE) in Tanzania. Specifically, the study…
Descriptors: Foreign Countries, Information Technology, Distance Education, Best Practices
Grunfeld, Helena; Ng, Maria Lee Hoon – International Review of Research in Open and Distance Learning, 2013
Open distance learning (ODL) has long been an important option for formal and non-formal education (NFE) in most developed and developing countries, but less so in post-conflict countries, including Cambodia. However, in Cambodia there is now greater awareness that ODL can complement traditional face-to-face educational approaches, particularly as…
Descriptors: Developing Nations, Foreign Countries, Distance Education, Methods
Berry, Kimberly Scriven; Herrington, Carolyn D. – Educational Policy, 2013
Drawing upon research on federalism, localism, and professional autonomy, this article explores how educational stakeholders used social media to discuss and organize against the implementation of Differentiated Accountability in a large Florida school district. The results showed that the stakeholders used social media to engage in sense making…
Descriptors: Accountability, Professional Autonomy, Educational Policy, Academic Achievement
Sebring, Penny Bender; Brown, Eric R.; Julian, Kate M.; Ehrlich, Stacy B.; Sporte, Susan E.; Bradley, Erin; Meyer, Lisa – University of Chicago Consortium on Chicago School Research, 2013
Opened in fall 2009, YOUmedia attracts high schoolaged teens who want a safe and welcoming place to hang out and socialize, as well as those with established or nascent interests in both digital and traditional media. With the guidance of staff and the synergy of peer involvement, participants discover and pursue their interests through both…
Descriptors: Urban Areas, Adolescents, Public Libraries, Electronic Publishing
Koc, Mustafa; Ferneding, Karen Ann – Online Submission, 2013
Contemporary studies have become interested in determining transformative effects of information and communication technologies on youngsters' social and cultural identity developments. Internet cafés are techno- social spaces where people access to digital media and interact with global cultural flows. Such interactions are profound because they…
Descriptors: Ethnography, Life Style, Information Technology, Internet
Bandyopadhyay, Alankar – ProQuest LLC, 2013
Since the 1920s, ICTs have been endorsed as solutions to challenges of access and quality in education. Proponents have also supported technology use in education on grounds that it could potentially impact cognitive, affective, and pedagogical outcomes. Based on these perceived benefits, many developed and developing countries have been…
Descriptors: Foreign Countries, Educational Technology, Technology Integration, Access to Education
Powell, Valerie J. H.; Sirinterlikci, Arif; Zomp, Christopher; Johnson, Randall S.; Miller, Phillip; Powell, James C. – International Association for Development of the Information Society, 2013
This paper updates the efforts to educate blind students in higher education in the digital age and describes how to support the development of mental models in learning through tactile learning and 3D-printing technology. It cites research documenting a drop in Braille literacy along with the growth in use of digital technologies by blind…
Descriptors: Electronic Learning, Educational Technology, Technology Uses in Education, Higher Education
Rusanganwa, Joseph – English for Specific Purposes, 2013
This study investigates whether the integration of ICT in education can facilitate teaching and learning. An example of such integration is computer assisted language learning (CALL) of English technical vocabulary by undergraduate physics students in Rwanda. The study draws on theories of cognitive load and multimedia learning to explore learning…
Descriptors: Physics, Foreign Countries, Science Teachers, Scores
Ramasamy, Shamala – Online Submission, 2011
In this information age, the amount of complex information available due to technological advancement would require undergraduates to be extremely competent in processing information systematically. Critical thinking ability of undergraduates has been the focal point among educators, employers and the public at large. One of the dimensions of…
Descriptors: Critical Thinking, Technological Advancement, Foreign Countries, Higher Education
Koh, Byungwan – ProQuest LLC, 2011
The advent of information technology has enabled firms to collect significant amounts of data about individuals and mine the data for developing their strategies. Profiling of individuals is one common use of data collected about them. It refers to using known or inferred information to categorize the type of an individual and to tailor specific…
Descriptors: Screening Tests, Program Effectiveness, Information Technology, Data Collection
Kaddouri, Abdelaaziz – ProQuest LLC, 2011
Current data mining (DM) technology is not domain-specific and therefore rarely generates reliable, business actionable knowledge that can be used to improve the effectiveness of the decision-making process in the banking industry. DM is mainly an autonomous, data-driven process with little focus on domain expertise, constraints, or requirements…
Descriptors: Expertise, Banking, Trend Analysis, Data
Feldman, Sue S. – ProQuest LLC, 2011
Information exchange is a cornerstone in facilitating a strategic advantage in business. However, health information exchange has not shared that same foundation in health care and related secondary uses, especially when the information is used for something other than diagnosis, treatment, or payment. This case study provides an in-depth…
Descriptors: Disability Identification, Case Studies, Public Agencies, Private Agencies
Swift, Ian – ProQuest LLC, 2011
Information technology (IT) outsourcing is a business trend aimed at reducing costs and enabling companies to concentrate on their core competencies. This qualitative multiple case design research study explored the effects of hidden costs on the operational management of IT outsourcing. The study involved analyzing IT outsourcing agreements as…
Descriptors: Information Technology, Outsourcing, Costs, Qualitative Research
Shannon, Brooke – ProQuest LLC, 2011
In the alleged information society, providing access to ICT purportedly will enable people, in all walks of life, to actively participate across multiple realms of social, economic, and political life. However, ICT initiatives in Kenya have not necessarily promoted people's ideal participation in an information society. Emphasis on ICT in IL…
Descriptors: Foreign Countries, Information Technology, Information Literacy, Females
Yang, Yubao – ProQuest LLC, 2011
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
Descriptors: Information Security, Surveys, Information Technology, Economic Factors

Peer reviewed
Direct link
