Publication Date
In 2025 | 61 |
Since 2024 | 205 |
Since 2021 (last 5 years) | 577 |
Since 2016 (last 10 years) | 2612 |
Since 2006 (last 20 years) | 5351 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Teachers | 68 |
Researchers | 36 |
Practitioners | 35 |
Policymakers | 14 |
Students | 9 |
Administrators | 8 |
Media Staff | 8 |
Counselors | 6 |
Parents | 5 |
Support Staff | 3 |
Community | 1 |
More ▼ |
Location
Turkey | 171 |
Australia | 162 |
Canada | 141 |
California | 111 |
China | 80 |
United Kingdom | 78 |
United Kingdom (England) | 72 |
Texas | 69 |
United States | 69 |
Germany | 66 |
Taiwan | 61 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards without Reservations | 1 |
Meets WWC Standards with or without Reservations | 3 |
Nilsen, Adam P. – Journal of the Learning Sciences, 2016
This article presents a framework for understanding historical perspective taking (HPT), the effort to use historical material to explore the internal states of past people. It addresses gaps in HPT research by (a) linking HPT to theories and research from the social science disciplines on perspective taking and the self and (b) proposing a way to…
Descriptors: History, Perspective Taking, Young Adults, Protocol Analysis
Bollen, Laurens; van Kampen, Paul; Baily, Charles; De Cock, Mieke – Physical Review Physics Education Research, 2016
Many students struggle with the use of mathematics in physics courses. Although typically well trained in rote mathematical calculation, they often lack the ability to apply their acquired skills to physical contexts. Such student difficulties are particularly apparent in undergraduate electrodynamics, which relies heavily on the use of vector…
Descriptors: Science Instruction, Magnets, Energy, Semi Structured Interviews
Starovoytova, Diana; Namango, Saul – Journal of Education and Practice, 2016
This study is a fraction of a larger research on cheating in exams at the School of Engineering (SOE). The study design used a descriptive survey approach and a document analysis. A designed confidential self report questioner was applied as the main instrument for this study, with the sample size of 100 subjects, and a response rate of 95%. The…
Descriptors: Cheating, Ethics, Student Behavior, Undergraduate Students
Onwuegbuzie, Anthony J.; Frels, Rebecca K.; Hwang, Eunjin – Journal of Educational Issues, 2016
Onwuegbuzie and Frels (2014) provided a step-by-step guide illustrating how discourse analysis can be used to analyze literature. However, more works of this type are needed to address the way that counselor researchers conduct literature reviews. Therefore, we present a typology for coding and analyzing information extracted for literature…
Descriptors: Literature Reviews, Discourse Analysis, Coding, Computer Software
Leckie, Alisa; Wall, Amanda – Current Issues in Middle Level Education, 2016
This study explored how pre-service teachers integrated literacy in middle level social studies. This study was conducted in the context of the Common Core State Standards (CCSS) and their focus on disciplinary literacy, the Council for the Accreditation of Educator Preparation (CAEP) Standards and their focus on rich clinical experiences, and…
Descriptors: Middle School Teachers, Preservice Teachers, Social Studies, Literacy Education
Thorne, Tristan – TESOL Journal, 2016
The use of mobile devices in the language classroom can help accomplish innumerable learning objectives, yet many teachers regard smartphones and tablets as obstacles to lesson goals. However, as portable technology continues to infiltrate classroom boundaries, it is becoming increasingly clear that educators should find ways to take advantage of…
Descriptors: Second Language Learning, Handheld Devices, Telecommunications, Coding
Nguyen, Bang; Yu, Xiaoyu; Japutra, Arnold; Chen, Cheng-Hao Steve – Active Learning in Higher Education, 2016
The concept of reverse teaching, considered by some as the education model of the future due to increasing technological availability in the classroom, has received great attention in education research lately. However, the focus of these studies has mainly been on the understanding of reverse teaching in terms of its application rather than…
Descriptors: Teaching Methods, Technology Uses in Education, Educational Technology, Blended Learning
Good, Jonathon; Keenan, Sarah; Mishra, Punya – Journal of Computers in Mathematics and Science Teaching, 2016
The popular press is rife with examples of how students in the United States and around the globe are learning to program, make, and tinker. The Hour of Code, maker-education, and similar efforts are advocating that more students be exposed to principles found within computer science. We propose an expansion beyond simply teaching computational…
Descriptors: Aesthetics, Computer Science Education, Thinking Skills, Computer Literacy
Hutchison, Amy; Nadolny, Larysa; Estapa, Anne – Reading Teacher, 2016
In this article the authors present the concept of Coding Literacy and describe the ways in which coding apps can support the development of Coding Literacy and disciplinary and digital literacy skills. Through detailed examples, we describe how coding apps can be integrated into literacy instruction to support learning of the Common Core English…
Descriptors: Coding, Literacy, Courseware, Concept Teaching
Smith, Ryan C.; Shin, Dongjo; Kim, Somin – North American Chapter of the International Group for the Psychology of Mathematics Education, 2016
Our mathematics cognitive technology noticing framework is based on professional noticing and curricular noticing frameworks and data collected in a study that explored how secondary mathematics teachers evaluate technology. Our participants displayed three categories of noticing: attention to features of technology, interpretation of the…
Descriptors: Mathematics Teachers, Attention, Educational Technology, Technology Uses in Education
Polanin, Joshua R.; Tanner-Smith, Emily E.; Hennessy, Emily A. – Grantee Submission, 2016
Practitioners and policymakers rely on meta-analyses to inform decision-making around the allocation of resources to individuals and organizations. It is therefore paramount to consider the validity of these results. A well-documented threat to the validity of research synthesis results is the presence of publication bias, a phenomenon where…
Descriptors: Publications, Periodicals, Bias, Effect Size
McCue, Cheryl A. R. – ProQuest LLC, 2016
Decades of research and practice suggest that educational administrators need to experience opportunities for professional development and continuous learning. This project study addressed the problem regarding the lack of a formal or systemic plan for professional development of central office administrators in a large suburban school district in…
Descriptors: Central Office Administrators, Professional Development, Suburban Schools, Professional Continuing Education
Shuler, Douglas D. – ProQuest LLC, 2016
This study was conducted to explore if the Texas peace officer tuition exemption program is being used to the extent and for the purposes outlined with regard to the state law. A qualitative case study method was implemented and conducted to find determine if Texas peace officers are using the program, to what extent the program being used, the…
Descriptors: Police, Police Education, Attitude Measures, Higher Education
Meta-Analysis: Effects of on Children's Learning in 15 Countries. Sage Research Methods Cases Part 1
Marie-Louise Mares; Zhongdang Pan – Sage Research Methods Cases, 2016
Staff members at Sesame Workshop asked us to conduct a meta-analysis of their proprietary evaluation research on the effects of viewing international versions of "Sesame Street." Given global crises in early childhood education, and given the wide reach of "Sesame Street," it was of considerable interest to us whether there…
Descriptors: Meta Analysis, Children, Educational Television, Case Studies
Dikaliotis, Theodoros K. – ProQuest LLC, 2013
In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…
Descriptors: Computer Networks, Information Security, Information Systems, Coding