NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Joshua R. Polanin; Qi Zhang; Joseph Taylor; Ryan T. Williams; Megha Joshi; Lauren Burr – Grantee Submission, 2022
Systematic reviews and meta-analyses are important techniques because they synthesize results from multiple primary studies on a similar topic. To influence policy, practice, and research, however, synthesis researchers must translate the results for various audiences. Ideally, the translation drives future research agendas, informs policymaking,…
Descriptors: Evidence, Educational Research, Meta Analysis, Concept Mapping
Peer reviewed Peer reviewed
Direct linkDirect link
Rasheed, Fareeha; Wahid, Abdul – International Journal of Information and Learning Technology, 2019
Purpose: The purpose of this paper is to identify the different sequence generation techniques for learning, which are applied to a broad category of personalized learning experiences. The papers have been classified using different attributes, such as the techniques used for sequence generation, attributes used for sequence generation; whether…
Descriptors: Sequential Approach, Electronic Learning, Futures (of Society), Student Characteristics
Peer reviewed Peer reviewed
Direct linkDirect link
Xia, Tian; Shumin, Zhang; Yifeng, Wu – Chinese Education & Society, 2016
We utilized cross tabulation statistics, word frequency counts, and content analysis of research output to conduct a bibliometric study, and used CiteSpace software to depict a knowledge map for research on entrepreneurship education in China from 2004 to 2013. The study shows that, in this duration, the study of Chinese entrepreneurship education…
Descriptors: Foreign Countries, Entrepreneurship, Higher Education, Educational Research
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chen, Yong; He, Wu – International Review of Research in Open and Distance Learning, 2013
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Descriptors: Computer Security, Risk, Online Courses, Electronic Publishing
Peer reviewed Peer reviewed
Direct linkDirect link
Keppens, Jeroen; Hay, David – Computer Science Education, 2008
A key challenge of effective teaching is assessing and monitoring the extent to which students have assimilated the material they were taught. Concept mapping is a methodology designed to model what students have learned. In effect, it seeks to produce graphical representations (called concept maps) of the concepts that are important to a given…
Descriptors: Concept Mapping, Programming, Teaching Methods, Educational Assessment