Publication Date
| In 2026 | 0 |
| Since 2025 | 69 |
| Since 2022 (last 5 years) | 426 |
| Since 2017 (last 10 years) | 1090 |
| Since 2007 (last 20 years) | 3572 |
Descriptor
Source
Author
| Young, Jeffrey R. | 14 |
| Waters, John K. | 13 |
| Breeding, Marshall | 12 |
| Villano, Matt | 12 |
| Moore, John W., Ed. | 11 |
| Barker, Philip | 8 |
| Eiser, Leslie | 8 |
| Panettieri, Joseph C. | 8 |
| Schaffhauser, Dian | 8 |
| Siegle, Del | 8 |
| Abramovich, Sergei | 7 |
| More ▼ | |
Publication Type
| Reports - Descriptive | 9066 |
| Journal Articles | 7668 |
| Speeches/Meeting Papers | 766 |
| Opinion Papers | 583 |
| Guides - Non-Classroom | 287 |
| Guides - Classroom - Teacher | 188 |
| Information Analyses | 163 |
| Book/Product Reviews | 115 |
| Computer Programs | 92 |
| Tests/Questionnaires | 82 |
| Reports - Research | 75 |
| More ▼ | |
Education Level
Audience
| Practitioners | 1008 |
| Teachers | 777 |
| Researchers | 219 |
| Administrators | 151 |
| Media Staff | 114 |
| Policymakers | 60 |
| Students | 50 |
| Parents | 19 |
| Community | 8 |
| Counselors | 8 |
| Support Staff | 8 |
| More ▼ | |
Location
| United Kingdom | 159 |
| Australia | 127 |
| Canada | 75 |
| California | 72 |
| United States | 58 |
| Spain | 57 |
| New York | 52 |
| Texas | 40 |
| Germany | 37 |
| Massachusetts | 35 |
| Florida | 33 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
| Does not meet standards | 1 |
Wang, Shouhong; Wang, Hai – Journal of Information Systems Education, 2011
Given the emergence of service-oriented architecture, IS students need to be knowledgeable of multiple server-side computer programming languages to be able to meet the needs of the job market. This paper outlines the pedagogy of an innovative course of multiple server-side computer languages for the undergraduate IS majors. The paper discusses…
Descriptors: Labor Market, Teaching Methods, Undergraduate Study, Course Descriptions
Tekinerdogan, Bedir – Computer Science Education, 2011
Model-driven software development (MDSD) aims to support the development and evolution of software intensive systems using the basic concepts of model, metamodel, and model transformation. In parallel with the ongoing academic research, MDSD is more and more applied in industrial practices. After being accepted both by a broad community of…
Descriptors: Foreign Countries, Computer Software, Graduate Study, Industry
Thomas, M. S.; Kothari, D. P.; Prakash, A. – IEEE Transactions on Education, 2011
Automation of power systems is gaining momentum across the world, and there is a need to expose graduate and undergraduate students to the latest developments in hardware, software, and related protocols for power automation. This paper presents the design, development, and commissioning of an automation lab to facilitate the understanding of…
Descriptors: Foreign Countries, Undergraduate Students, Graduate Students, Computer Assisted Instruction
Moore, David Richard – International Journal on E-Learning, 2008
Quality assurance in instructional development demands an exhaustive formative evaluation effort and applied testing. Unfortunately, this process is expensive and requires large numbers of user testers with characteristics similar to the intended audience. This article presents a procedure for increasing the efficiency of quality assurance efforts…
Descriptors: Instructional Development, Formative Evaluation, Quality Control, Technology Integration
Mason, Oliver – International Journal of English Studies, 2008
Despite the central role of the computer in corpus research, programming is generally not seen as a core skill within corpus linguistics. As a consequence, limitations in software for text and corpus analysis slow down the progress of research while analysts often have to rely on third party software or even manual data analysis if no suitable…
Descriptors: Computer Software, Computational Linguistics, Language Research, Role
Hyde, Hartley – Australian Mathematics Teacher, 2008
Tangrams have sometimes been used as an extension activity intended only to keep faster students busy while others finished essential desk-work. Without adequate introduction, many find that tangrams are just an open-ended form of a jigsaw puzzle. Happily teachers have discovered that games provide an effective introduction to a new topic. In the…
Descriptors: Geometric Concepts, Geometry, Internet, Games
Foster, E. Michael; Kalil, Ariel – Developmental Psychology, 2008
Two forces motivate this special section, "New Methods for New Questions in Developmental Psychology." First are recent developments in social science methodology and the increasing availability of those methods in common software packages. Second, at the same time psychologists' understanding of developmental phenomena has continued to grow. At…
Descriptors: Psychologists, Social Sciences, Developmental Psychology, Evaluation Methods
Paine, Thomas A.; Griggs, Tyler J. – EDUCAUSE Quarterly, 2008
Educational institutions today face budgetary restraints and scarce resources, complicating the decision of how to allot bandwidth for campus network users. Additionally, campus concerns over peer-to-peer networking (specifically outbound Internet traffic) have increased because of bandwidth and copyright issues. In this article, the authors…
Descriptors: Management Systems, Schools, Computer Software, Internet
van Harmelen, M. – Interactive Learning Environments, 2008
Increasingly, there is a shared understanding that the educational approach driving the development of Personal Learning Environments (PLEs) is one of learner empowerment and facilitation of the efforts of self-directed learners. This approach fits well with concepts of social constructivism, constructionism, and the development and execution of…
Descriptors: Constructivism (Learning), Experiments, Educational Environment, Independent Study
Christie, Derek – Teaching Statistics: An International Journal for Teachers, 2008
This article shows how to use Microsoft Excel to get data from the Internet into a statistically usable form.
Descriptors: Computer Literacy, Internet, Information Technology, Information Skills
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software
Zhang, Zhiyong; McArdle, John J.; Wang, Lijuan; Hamagami, Fumiaki – Structural Equation Modeling: A Multidisciplinary Journal, 2008
Bayesian methods are becoming very popular despite some practical difficulties in implementation. To assist in the practical application of Bayesian methods, we show how to implement Bayesian analysis with WinBUGS as part of a standard set of SAS routines. This implementation procedure is first illustrated by fitting a multiple regression model…
Descriptors: Bayesian Statistics, Computer Software, Monte Carlo Methods, Multiple Regression Analysis
De Groff, Amy Begg – Computers in Libraries, 2008
Librarians role as partners in education is to instruct customers on how to find information. Their purpose is to get information to customers. Often, that takes the form of delivering a book. Sometimes, it is accomplished by typing a URL into a web browser, reading text, and copying some of it into a text document for manipulation and…
Descriptors: Computer Software, Public Libraries, Instructional Materials, Access to Information
Foster, Andrea – Chronicle of Higher Education, 2008
At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…
Descriptors: Computer Software, Confidential Records, Student Records, Computer Security
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education

Peer reviewed
Direct link
