Publication Date
| In 2026 | 7 |
| Since 2025 | 743 |
| Since 2022 (last 5 years) | 4186 |
| Since 2017 (last 10 years) | 10443 |
| Since 2007 (last 20 years) | 25921 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2922 |
| Researchers | 1809 |
| Teachers | 1764 |
| Policymakers | 1619 |
| Administrators | 1194 |
| Students | 321 |
| Media Staff | 307 |
| Community | 264 |
| Parents | 114 |
| Counselors | 79 |
| Support Staff | 36 |
| More ▼ | |
Location
| United States | 1500 |
| Australia | 1407 |
| Canada | 1404 |
| California | 1315 |
| Texas | 920 |
| New York | 819 |
| United Kingdom | 782 |
| Florida | 716 |
| Illinois | 620 |
| North Carolina | 557 |
| Pennsylvania | 529 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 13 |
| Meets WWC Standards with or without Reservations | 21 |
| Does not meet standards | 24 |
Regional Educational Laboratory, 2014
Technology continues to radically change how we create and consume information. Today, news, reports, and other material are often delivered quickly through pictures, colors, or other eye-catching visual elements. Words still matter, but they may be tweeted, viewed on a smartphone, or placed in a call-out box in a report. The design of these items…
Descriptors: Design, Graphic Arts, Color, Data
Lesh, Kathryn A. – ProQuest LLC, 2014
Adoption and use of health information technology, the electronic health record (EHR) in particular, has the potential to help improve the quality of care, increase patient safety, and reduce health care costs. Unfortunately, adoption and use of health information technology has been slow, especially when compared to the adoption and use of…
Descriptors: Electronic Publishing, Case Records, Patients, Community Health Services
Grama, Joanna – EDUCAUSE, 2014
This "Just in Time" research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this…
Descriptors: Higher Education, Information Policy, Information Security, Privacy
Thompson, Eleanor Elizabeth – ProQuest LLC, 2014
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…
Descriptors: Information Technology, Information Security, Risk Management, Computers
Neena Thota – Sage Research Methods Cases, 2014
This case provides an account of the use of the repertory grid interview technique as one aspect of my PhD study. The doctoral thesis documented the development of a holistic approach to redesign an introductory programming course to enhance learning and teaching of object-oriented programming to novices. Starting with the premise that it is not…
Descriptors: Interviews, Research Methodology, Programming, Educational Change
Arthur Shelley – Sage Research Methods Cases, 2014
The purpose of this case study is to highlight the importance and limitations of methodology and research design in the exploration of highly subjective behavioural research. People are social creatures, and as such, their 'reality' is what they perceive to be true, which can be very difficult to 'prove' (by them or others). Two people can observe…
Descriptors: Behavioral Science Research, Research Methodology, Research Design, Data Analysis
Anwar, M. A.; Ahmed, Naseer; Al Ameen, Abdurahem Mohammed – Contemporary Issues in Education Research, 2012
The evaluation of students' expected performance and course effectiveness play a vital role in determining the course contribution toward meeting the program's learning objectives or outcomes. The success of any course not only requires a well-designed syllabus with clearly defined course learning outcomes and the use of appropriate outcome-based…
Descriptors: Foreign Countries, College Outcomes Assessment, Evaluation Methods, Student Evaluation
Zhuang, Hong – American Journal of Business Education, 2012
Economic data play an important role in the study of macroeconomics. Teaching with data through interactive classes can engage students more fully in the learning process. Although the pedagogy of teaching with data has been widely applied in the undergraduate science classroom, its extension to the economics classroom is rarely discussed. This…
Descriptors: Macroeconomics, Teaching Methods, Data, Curriculum Enrichment
Waters, John K. – Campus Technology, 2012
In the case of higher education, the hills are more like mountains of data that "we're accumulating at a ferocious rate," according to Gerry McCartney, CIO of Purdue University (Indiana). "Every higher education institution has this data, but it just sits there like gold in the ground," complains McCartney. Big Data and the new tools people are…
Descriptors: Higher Education, Educational Change, Data, Data Processing
Gemici, Sinan; Rojewski, Jay W.; Lee, In Heok – Career and Technical Education Research, 2012
Most quantitative analyses in workforce education are affected by missing data. Traditional approaches to remedy missing data problems often result in reduced statistical power and biased parameter estimates due to systematic differences between missing and observed values. This article examines the treatment of missing data in pertinent…
Descriptors: Research Methodology, Statistical Analysis, Data Collection, Pattern Recognition
Papadouris, Nicos – Science Education, 2012
This paper reports on an attempt to help 12-year-old students develop a specific optimization strategy for selecting among possible solutions in socioscientific decision-making situations. We have developed teaching and learning materials for elaborating this strategy, and we have implemented them in two intact classes (N = 48). Prior to and after…
Descriptors: Group Dynamics, Data Analysis, Decision Making, Task Analysis
Lauckner, Heidi; Paterson, Margo; Krupa, Terry – Qualitative Report, 2012
Often, research projects are presented as final products with the methodologies cleanly outlined and little attention paid to the decision-making processes that led to the chosen approach. Limited attention paid to these decision-making processes perpetuates a sense of mystery about qualitative approaches, particularly for new researchers who will…
Descriptors: Grounded Theory, Constructivism (Learning), Community Development, Data Analysis
Kalaian, Sema A.; Kasim, Rafa M. – Practical Assessment, Research & Evaluation, 2012
The Delphi survey technique is an iterative mail or electronic (e-mail or web-based) survey method used to obtain agreement or consensus among a group of experts in a specific field on a particular issue through a well-designed and systematic multiple sequential rounds of survey administrations. Each of the multiple rounds of the Delphi survey…
Descriptors: Delphi Technique, Mail Surveys, Online Surveys, Data Collection
Lindh, Maria; Nolin, Jan – European Educational Research Journal, 2016
The aim of this study is to show how Google's business model is concealed within Google Apps for Education (GAFE) as well as how such a bundle is perceived within one educational organisation, consisting of approximately 30 schools. The study consists of two parts: 1) a rhetorical analysis of Google policy documents and 2) an interview study in a…
Descriptors: Privacy, Data Collection, Information Sources, Program Implementation
Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C. – IEEE Transactions on Education, 2016
This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…
Descriptors: Teaching Methods, Information Security, Information Networks, Computer Networks

Direct link
Peer reviewed
