Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
Descriptor
Publication Type
| Reports - Research | 2 |
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
Education Level
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 1 | 1 |
| Grade 2 | 1 |
| Grade 3 | 1 |
| Kindergarten | 1 |
| Primary Education | 1 |
Audience
Location
| Massachusetts | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ju Ling; Min Gao – International Journal of Information and Communication Technology Education, 2025
This study investigates the integration of computer-aided design (CAD), a technology for creating digital drawings and models, into art education to enhance creativity and improve teaching quality. Utilizing a mixed-methods approach with a cohort of 150 students, the results demonstrate significant advancements in creativity (a 33.3% increase),…
Descriptors: Computer Assisted Design, Art Education, Computer Uses in Education, Creativity
Tiffany Wu; Christina Weiland – Annenberg Institute for School Reform at Brown University, 2024
Chronic absenteeism is a critical issue that has been linked to many adverse student outcomes. The current study focuses on improving a key system already in place in many school districts--early warning systems (EWSs)--in order to decrease chronic absenteeism in students' earliest schooling years. Using a demographically diverse population of…
Descriptors: Elementary School Students, Kindergarten, Grade 1, Grade 2
Shehroze Farooqi – ProQuest LLC, 2021
Popular platforms such as Facebook and Twitter integrate third-party apps from developers to enhance the experience of their users. While third-party apps are widely used to provide legitimate functionality, the abuse of third-party apps by attackers is also becoming prevalent. Attackers are abusing third-party apps to orchestrate their malicious…
Descriptors: Social Media, Computer Security, Crime Prevention, Information Security

Peer reviewed
Direct link
