Publication Date
| In 2026 | 0 |
| Since 2025 | 25 |
| Since 2022 (last 5 years) | 212 |
| Since 2017 (last 10 years) | 495 |
| Since 2007 (last 20 years) | 1281 |
Descriptor
| Information Technology | 2009 |
| Computer Software | 1778 |
| Foreign Countries | 674 |
| Educational Technology | 479 |
| Higher Education | 430 |
| Teaching Methods | 407 |
| Internet | 404 |
| Computer Uses in Education | 261 |
| Technology Integration | 229 |
| Computer Assisted Instruction | 219 |
| Student Attitudes | 197 |
| More ▼ | |
Source
Author
| Raths, David | 5 |
| Villano, Matt | 5 |
| Waters, John K. | 5 |
| Panettieri, Joseph C. | 4 |
| Wheeler, Brad | 4 |
| Almeroth, Kevin | 3 |
| Asuncion, Jennison V. | 3 |
| Barile, Maria | 3 |
| Cummings, Jeff | 3 |
| Dagiene, Valentina | 3 |
| Fichten, Catherine S. | 3 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 87 |
| Teachers | 56 |
| Administrators | 43 |
| Media Staff | 29 |
| Policymakers | 23 |
| Researchers | 20 |
| Students | 13 |
| Community | 2 |
| Parents | 2 |
Location
| United Kingdom | 56 |
| Australia | 54 |
| Turkey | 39 |
| United States | 39 |
| California | 31 |
| Canada | 26 |
| China | 25 |
| Spain | 23 |
| United Kingdom (England) | 23 |
| Taiwan | 19 |
| South Africa | 17 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedKranch, Douglas A. – Information Technology and Libraries, 1998
Discusses electronic-document preservation and argues that digital tablets, storing both the documents and the software to use them, should be developed as a more permanent alternative to migration, currently the primary preservation strategy. Discusses technology that could be used to produce a digital tablet, lists life expectancy of digital…
Descriptors: Archives, Comparative Analysis, Computer Software, Computer Storage Devices
Peer reviewedKing, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Gustitus, Cheryl – Information Outlook, 1998
"Push technology," or Webcasting, employs user defined criteria to search for specific information and deliver it when and where directed, enhancing the value special librarians add to the information dissemination process. This article examines push technology, its Internet and Intranet applications, and commercially available…
Descriptors: Computer Software, Delivery Systems, Information Retrieval, Information Seeking
McDermott, Irene E. – Searcher, 2001
Discusses making the World Wide Web accessible to people with physical disabilities. Includes Web site design; text alternatives for graphic elements; Web sites that help construct accessible Web pages; software packages to improve accessibility; accessible electronic resources in libraries; and the Americans with Disabilities Act and standards…
Descriptors: Accessibility (for Disabled), Computer Graphics, Computer Software, Design Requirements
Peer reviewedOrr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks
van Dam, Andries; Becker, Sascha; Simpson, Rosemary Michelle – EDUCAUSE Review, 2005
This article begins with a recapitulation of some well-known technology trends that make current platforms so exciting. Leveraging this technology into highly desirable forms of learning is then briefly discussed. This is followed by an examination of an IT-oriented education research agenda prepared by a consortium called the Learning Federation…
Descriptors: Internet, Computer Software, Information Technology, Computer Uses in Education
Paquette, Gilbert; Leonard, Michel; Lundgren-Cayrol, Karin; Mihaila, Stefan; Gareau, Denis – Educational Technology & Society, 2006
This chapter states and explains that a Learning Design is the result of a knowledge engineering process where knowledge and competencies, learning design and delivery models are constructed in an integrated framework. We present a general graphical language and a knowledge editor that has been adapted to support the construction of learning…
Descriptors: Learning Strategies, Computer Software, Programming, Instructional Design
Baudino, Frank, Ed.; Ury, Connie Jo, Ed.; Park, Sarah G., Ed. – Online Submission, 2008
Eighteen scholarly papers and eighteen abstracts comprise the content of the 8th "Brick and Click Libraries Symposium," held annually at Northwest Missouri State University in Maryville, Missouri. The proceedings, authored by academic librarians and presented at the symposium, portray the contemporary and future face of librarianship. Many of the…
Descriptors: Library Education, Instructional Design, Semantics, Copyrights
Roberts, Sheridan – OECD Publishing (NJ1), 2008
This paper describes the findings of an OECD project examining ICT impact measurement and analyses based on official statistics. Both economic and social impacts are covered and some results are presented. It attempts to place ICT impacts measurement into an Information Society conceptual framework, provides some suggestions for standardising…
Descriptors: Information Technology, Foreign Countries, Sustainable Development, Measurement Techniques
Zacamy, Jenna; Miller, Gloria I.; Cabalo, Jessica V. – Empirical Education Inc., 2008
In the fall of 2005 the Maui Educational Consortium began a project that was funded through the Math Science Partnership program to implement the "Cognitive Tutor[R]" (CT) program, published by Carnegie Learning, in some of the Algebra 1 classes in the Maui School District and at the Maui Community College. At that time, Empirical…
Descriptors: Academic Achievement, Mathematics Achievement, Learner Engagement, Access to Computers
Seng, Khoo Hock; Fraser, Barry J. – Technology, Pedagogy and Education, 2008
Reviews of past research on psychosocial learning environments show that relatively few studies have involved the use of environment dimensions either as criterion variables in the evaluation computer education programs or with adult learners (in contrast to elementary and secondary school students). This study is distinctive in that it used a…
Descriptors: Student Attitudes, Program Evaluation, Adult Education, Factor Structure
Beynon, Meurig – Educational Technology & Society, 2007
Many have had high expectations for the impact of computer-based technology on educational practice. By and large, these expectations have not been realised. It has become evident that innovative technology alone does not necessarily guarantee progress--nor perhaps even significant change--in educational practice. This has led educational…
Descriptors: Models, Information Technology, Educational Philosophy, Instructional Design
Alexander, Shirley; Golja, Tanja – Educational Technology & Society, 2007
Higher education institutions undertake a range of approaches to evaluating and making judgments about the quality of their e-learning provision. This paper begins by exploring benchmarking as one current strategy in common use in universities to identify and implement quality practices: from the use of checklists (for example, of best practices…
Descriptors: Systems Approach, Teaching Methods, Student Experience, Educational Quality
Strom, Paris S.; Strom, Robert D. – Educational Forum, The, 2007
There is increasing concern about cheating in the secondary schools. This article describes the prevalence of dishonesty in testing, motivation for student cheating, new forms of deception using technology tools, initiatives to protect security of tests, methods students use to obtain papers without crediting the original source, tools for…
Descriptors: Primary Sources, Integrity, Ethics, Cheating
Wentzel, Larry – Computers in Libraries, 2007
Librarians and archivists find themselves facing the prospect of digitization. Everyone is doing it, everyone needs it. Discussions rage nationally and internationally concerning what to digitize and the best means to present and retain digital objects. Digitization is the act of making something digital, expressing a physical object "in numerical…
Descriptors: Electronic Libraries, Access to Information, Media Adaptation, Information Technology

Direct link
