Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 9 |
Descriptor
Source
| EDUCAUSE Quarterly | 11 |
Author
| Agee, Anne | 1 |
| Awidi, Isaiah T. | 1 |
| Bennett, Cedric | 1 |
| BrckaLorenz, Allison | 1 |
| Clark, Jeffrey | 1 |
| Donald, Jeremy | 1 |
| Efaw, James | 1 |
| Essid, Joe | 1 |
| Guidry, Kevin R. | 1 |
| Hai-Jew, Shalin | 1 |
| Hampton, Scott | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 11 |
| Reports - Descriptive | 7 |
| Reports - Evaluative | 3 |
| Reports - Research | 1 |
Education Level
| Higher Education | 10 |
| Postsecondary Education | 4 |
| Adult Education | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| National Survey of Student… | 1 |
What Works Clearinghouse Rating
Stewart, Meg; Clark, Jeffrey; Donald, Jeremy; VanCamp, Keri – EDUCAUSE Quarterly, 2011
This article focuses on mobile computing with a tablet PC, drawing from over five years of experience teaching with tablets in outdoor, field-based classes. In this article, the authors discuss three courses--Environmental Science, Ecology, and Biology--taught at three colleges. Each course is treated as a vignette from the point of view of a…
Descriptors: Computer Uses in Education, Handheld Devices, Outdoor Education, Educational Technology
Hai-Jew, Shalin – EDUCAUSE Quarterly, 2011
This article showcases a virtual interactive participatory design activity for building a digital entomology lab. Conceptualized as a virtual complement to a general entomology course at Kansas State University, the lab would allow learners to explore morphological aspects of insects--their various forms and functions--in order to understand…
Descriptors: Instructional Design, Entomology, Lighting, Science Instruction
Essid, Joe; Wilde, Fran – EDUCAUSE Quarterly, 2011
Effective virtual simulations can embed participants in imaginary worlds. Researchers working in virtual worlds and gaming often refer to "immersion," a state in which a participant or player loses track of time and becomes one with the simulation. Immersive settings have been shown to deepen learning. Ken Hudson's work with students…
Descriptors: Foreign Countries, Computer Simulation, Simulated Environment, Role Playing
Agee, Anne; Rowe, Theresa; Woo, Melissa; Woods, David – EDUCAUSE Quarterly, 2010
A 2006 ECAR study defined cyberinfrastructure as the coordinated aggregate of "hardware, software, communications, services, facilities, and personnel that enable researchers to conduct advanced computational, collaborative, and data-intensive research." While cyberinfrastructure was initially seen as support for scientific and…
Descriptors: Research Needs, Research and Development, Research Universities, Computer Uses in Education
Guidry, Kevin R.; BrckaLorenz, Allison – EDUCAUSE Quarterly, 2010
This study extends the research into faculty and student use of contemporary academic technologies. The goals of the study are threefold. First, the study aims to unpack which technologies students and faculty use, and how often. Second, it aims to understand their experiences in the contexts in which they live them. Finally, it explores the…
Descriptors: Computer Uses in Education, Educational Technology, Technology Integration, Management Systems
Ruffini, Michael F. – EDUCAUSE Quarterly, 2008
Computer-generated mind maps, or e-maps, provide an outstanding e-learning tool for organizing and navigating web-based content and files. Considerable research indicates the effectiveness of using graphic organizers such as mind maps to facilitate meaningful learning. Tony Buzan and Barry Buzan argue that mind maps better harness the way the…
Descriptors: Maps, Brain, Internet, Instructional Materials
Lakhan, Shaheen E.; Jhunjhunwala, Kavita – EDUCAUSE Quarterly, 2008
Educational institutions have rushed to put their academic resources and services online, beginning the global community onto a common platform and awakening the interest of investors. Despite continuing technical challenges, online education shows great promise. Open source software offers one approach to addressing the technical problems in…
Descriptors: Online Courses, Computer Software, Computer Uses in Education, Educational Technology
Weiss, Meredith – EDUCAUSE Quarterly, 2008
Interaction design is a user-centered approach to development in which users and their goals are the driving force behind a project's design. Interaction design principles are fundamental to the design and implementation of effective websites, but they are not sufficient. This article argues that, to reach its full potential, a website should also…
Descriptors: Computer Software, Marketing, Interaction, Web Sites
Awidi, Isaiah T. – EDUCAUSE Quarterly, 2008
Course management systems (CMSs) currently drive educational delivery in most developed countries. Their absence in higher education in most developing countries creates a digital divide between first- and third-world students. Meeting the needs of higher education in Ghana therefore depends on identifying the factors that should inform the choice…
Descriptors: Higher Education, Management Systems, Foreign Countries, Computer Software
Efaw, James; Hampton, Scott; Martinez, Silas; Smith, Scott – EDUCAUSE Quarterly, 2004
All freshmen at the United States Military Academy at West Point now have laptop computers to use in class. Several instructors for the General Psychology course that all freshmen take are currently incorporating classroom learning activities and strategies to leverage the technology tools available with laptop computers. This article reports on a…
Descriptors: Student Attitudes, Computer Uses in Education, Educational Technology, Teaching Methods
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration

Peer reviewed
Direct link
