Publication Date
| In 2026 | 1 |
| Since 2025 | 128 |
| Since 2022 (last 5 years) | 586 |
| Since 2017 (last 10 years) | 1107 |
| Since 2007 (last 20 years) | 1575 |
Descriptor
| Computer Use | 1670 |
| Foreign Countries | 942 |
| Internet | 508 |
| Handheld Devices | 331 |
| Gender Differences | 311 |
| Student Attitudes | 311 |
| Information Technology | 243 |
| Educational Technology | 231 |
| College Students | 225 |
| Technology Uses in Education | 214 |
| Correlation | 205 |
| More ▼ | |
Source
Author
| Konca, Ahmet Sami | 5 |
| Alkan, Ayse | 4 |
| Downes, Toni | 4 |
| Selwyn, Neil | 4 |
| Teo, Timothy | 4 |
| Bagci, Hakki | 3 |
| Basaran, Bülent | 3 |
| Bertiz, Yasemin | 3 |
| Cotten, Shelia R. | 3 |
| Dilci, Tuncay | 3 |
| Duran, Erol | 3 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 21 |
| Parents | 9 |
| Practitioners | 9 |
| Researchers | 8 |
| Policymakers | 4 |
| Counselors | 2 |
| Students | 2 |
| Administrators | 1 |
| Media Staff | 1 |
| Support Staff | 1 |
Location
| Turkey | 235 |
| Australia | 55 |
| Canada | 48 |
| China | 48 |
| Spain | 41 |
| United Kingdom | 38 |
| United States | 35 |
| Sweden | 31 |
| India | 29 |
| South Korea | 27 |
| Germany | 25 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Simsek, Eylem; Simsek, Ali – Online Submission, 2013
The meaning of citizenship has usually been associated with the power of individuals in the process of social decision-making. Throughout the history, effective citizenship has required functional literacy skills as the fundamental factor for attending societal life. In the past, the 3Rs (writing, reading, and arithmetic) were considered to be…
Descriptors: Functional Literacy, Mass Media, Web Sites, Electronic Publishing
Choi, Min Suk – ProQuest LLC, 2013
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common…
Descriptors: Public Agencies, Computer Security, Self Efficacy, Computer Use
Morton, Alicia A. – ProQuest LLC, 2011
Objective: The purpose of this project was to examine the practice question, "What are the factors influencing acceptance of integrated PHRs for self-care management among the Howard University Hospital (HUH) Diabetes Treatment Clinic (DTC) patients?" These factors include a) demographic characteristics, b) computer…
Descriptors: Diabetes, Access to Computers, Intention, Patients
von Davier, Matthias; Naemi, Bobby; Roberts, Richard D. – Measurement: Interdisciplinary Research and Perspectives, 2012
This article describes an exploration of the distinction between typological and factorial latent variables in the domain of personality theory. Traditionally, many personality variables have been considered to be factorial in nature, even though there are examples of typological constructs dating back to Hippocrates. Recently, some…
Descriptors: Individual Differences, Item Response Theory, Classification, Personality Theories
Musa, Sajid; Ziatdinov, Rushan; Sozcu, Omer Faruk; Griffiths, Carol – European Journal of Contemporary Education, 2015
Computer animation in the past decade has become one of the most noticeable features of technology-based learning environments. By its definition, it refers to simulated motion pictures showing movement of drawn objects, and is often defined as the art in movement. Its educational application known as educational computer animation is considered…
Descriptors: Animation, Personality Traits, Computer Graphics, Interdisciplinary Approach
Zhang, Peter H. – ProQuest LLC, 2013
This research attempted to reveal the existence of digital divides, their relationships to users' socio-demographics, and the Internet adoption and usage patterns. It was a longitudinal investigation targeted to the adults eighteen years or older in the household setting from the nation-wide surveys conducted in the United States between 2000…
Descriptors: Access to Computers, Disadvantaged, Longitudinal Studies, Statistical Analysis
Norris, Alda M. – ProQuest LLC, 2011
Despite the importance of advising experiences, very little is known about the interpersonal communication dynamics of these interactions. This study addresses that knowledge gap by providing an analysis of audio recordings of advising sessions as they occurred in the offices of five academic advisors who met with undergraduate advisees (n= 28).…
Descriptors: Discourse Analysis, Undergraduate Students, Academic Advising, Interpersonal Communication
Waters, John K. – Campus Technology, 2011
A decade has passed since author, game designer, and educational thought leader Marc Prensky heralded the arrival of a new generation of students whose immersion in information technology distinguished them in fundamental ways from previous generations. Because they had spent their entire lives "surrounded by and using computers, videogames,…
Descriptors: Educational Principles, Definitions, Generational Differences, Social Change
Smith, Samuel Aarron – ProQuest LLC, 2010
The purpose of this study was to analyze Lipscomb University students' Internet use and involvement in extracurricular activities. A survey of students at Lipscomb University was conducted. As confirmed by the data the research was able to determine that the type of extracurricular activity a student participates in most often is related to the…
Descriptors: Extracurricular Activities, Internet, Computer Use, College Students
Bonner, Aisha Ain – ProQuest LLC, 2012
The focus of this research is the mandatory use of Computer Based Technology (CBT) with social work professionals. Such a study is important in order to investigate which determinants are essential for social workers 45 and older to achieve adoption of CBT. The membership list of the National Association of Social Workers provided access to…
Descriptors: Information Technology, Social Work, Comparative Analysis, Computer Use
Elwood, James A.; MacLean, George Robert – Computers & Education, 2012
With the ongoing development of technology and its ever increasing influence in the social and educational spheres, knowing whether users will embrace technological means is of considerable importance. This article looks at Willingness to Use Technology (WUT; MacLean & Elwood, 2009), an instrument developed to assess a potential technology…
Descriptors: Foreign Countries, Educational Technology, Psychometrics, Factor Analysis
Maloney, Stephen; Moss, Alan; Ilic, Dragan – Advances in Health Sciences Education, 2014
Social Networking Sites (SNS) have seen exponential growth in recent years. The high utilisation of SNS by tertiary students makes them an attractive tool for educational institutions. This study aims to identify health professional students' use and behaviours with SNS, including students' perspectives on potential applications within…
Descriptors: Social Networks, Electronic Learning, Technology Uses in Education, Health Education
Sariçoban, Arif – Eurasian Journal of Educational Research, 2013
Problem Statement: Computer technology plays a crucial role in foreign/second language (L2) instruction, and as such, L2 teachers display different attitudes towards the use of computers in their teaching activities. It is important to know what attitudes these teachers hold towards the use of computers and whether they have these varying…
Descriptors: Preservice Teachers, English (Second Language), Second Language Learning, Second Language Instruction
Turner, Kristen H. – Educational Horizons, 2012
Today's adolescents write to communicate--via text messaging, instant messaging, and social networking posts. They are skilled at manipulating their out-of-school digital language to communicate with an intended audience and to capture individual voice. Because the writing is informal, teens have the ability to break rules, and they can do so…
Descriptors: Writing Skills, Adolescents, Synchronous Communication, Influence of Technology
Ahmad, Altaf – ProQuest LLC, 2010
This dissertation involved the development of a new construct, perceived privacy breach (PPB), to evaluate how a person perceives breaches of privacy in terms of whether they perceive any exchange of information was fair or not and how they believe it will impact people whose information has been shared. . This instrument assists researchers to…
Descriptors: Privacy, Computer Use, Individual Psychology, Search Engines

Direct link
Peer reviewed
