Publication Date
| In 2026 | 0 |
| Since 2025 | 377 |
| Since 2022 (last 5 years) | 2781 |
| Since 2017 (last 10 years) | 7306 |
| Since 2007 (last 20 years) | 15861 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 1551 |
| Teachers | 735 |
| Researchers | 572 |
| Administrators | 299 |
| Parents | 287 |
| Policymakers | 244 |
| Counselors | 145 |
| Students | 107 |
| Community | 42 |
| Support Staff | 35 |
| Media Staff | 6 |
| More ▼ | |
Location
| Canada | 584 |
| Australia | 541 |
| United States | 522 |
| California | 459 |
| United Kingdom | 437 |
| United Kingdom (England) | 348 |
| Texas | 254 |
| New York | 220 |
| Turkey | 185 |
| Netherlands | 180 |
| China | 176 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 6 |
| Meets WWC Standards with or without Reservations | 9 |
| Does not meet standards | 6 |
Glanzer, Perry L.; Cockle, Theodore F.; Martin, Jessica; Alexander, Scott – Religious Education, 2023
Faith-based colleges and universities in America have historically been described as "church-related." Unfortunately, this classification is too one-dimensional, revealing virtually nothing about how faith-based identity influences the mission, rhetoric, curriculum, or policies of institutions. Although scholars have advanced…
Descriptors: Christianity, Religious Colleges, Protestants, Identification
Bedsole, Nathan H.; Hahn, Taylor Ward – Communication Teacher, 2023
This lesson offers students a way to analyze conspiracy theories while neither platforming dangerous ideas nor dismissing them as unworthy of academic study. Ideal for argument or rhetoric courses, first, the lesson advances conspiracy theories as a recognizable species of argument; second, the lesson uses a truncated version of Toulmin's model of…
Descriptors: Beliefs, Misconceptions, Communication (Thought Transfer), Learner Engagement
Kauer, Trevor – Communication Teacher, 2023
Courses: Interpersonal Communication, Family Communication, Relational Communication. Objectives: The objective of this study is to engage students in identifying close relationships' costs/rewards, resources, and development by creating a visual representation using a tree metaphor. Students will reflect on their close relationships and apply…
Descriptors: Interpersonal Relationship, Family Relationship, Identification, Concept Mapping
Waddington, Hannah; Macaskill, Ella; Whitehouse, Andrew J. O.; Billingham, Wesley; Alvares, Gail A. – Journal of Autism and Developmental Disorders, 2023
This study examined whether parent-reported atypical development in their child's first year was associated with age of diagnosis and age when parents first needed to consult a specialist about their child's development. It involved 423 children who participated in the Australian Autism Biobank. Most parents retrospectively identified [greater or…
Descriptors: Foreign Countries, Infants, Parents, Autism Spectrum Disorders
Lemon, David J. – ProQuest LLC, 2023
This qualitative, autoethnographic study sought to understand how multiracial men working in higher education staff roles described their experiences of racial identity. Eight participants, staff members at various higher education institutions across the United States, comprised the study population, including the study author. I conducted…
Descriptors: Multiracial Persons, Higher Education, School Personnel, Racial Identification
guerrero, valerie a.; Salinas, Cristobal, Jr. – Journal of Women and Gender in Higher Education, 2023
The term "Latinx" has gained much popularity in some higher education spaces, yet its meaning to and use by those categorized as such has remained unexplored. In this study, we employ narrative inquiry and the lens of Critical Race Feminism to understand how Latinx has evolved into an identity for three individuals who embrace Latinx as…
Descriptors: Self Concept, Student Attitudes, Racial Identification, Undergraduate Students
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Pearce, Julia M.; Lindekilde, Lasse; Parker, David – British Educational Research Journal, 2023
Higher education institutions in England, Scotland and Wales have an obligation under the 2015 Counter Terrorism and Security Act to protect students from being drawn into terrorism. This legislation has proved controversial, with concerns about the securitisation of education, as well as fears of over-reporting which could stigmatise individuals…
Descriptors: Foreign Countries, College Faculty, Teacher Attitudes, Terrorism
Sarker Monojit Asish – ProQuest LLC, 2023
Virtual Reality (VR) has been found useful to improve engagement and retention level of students, for some topics, compared to traditional learning tools such as books, and videos. However, a student could still get distracted and disengaged due to a variety of factors including stress, mind-wandering, unwanted noise, external alerts, and internal…
Descriptors: Students, Attention Control, Computer Simulation, Artificial Intelligence
Kelli Bird – Association for Institutional Research, 2023
Colleges are increasingly turning to predictive analytics to identify "at-risk" students in order to target additional supports. While recent research demonstrates that the types of prediction models in use are reasonably accurate at identifying students who will eventually succeed or not, there are several other considerations for the…
Descriptors: Prediction, Data Analysis, Artificial Intelligence, Identification
Boatswain-Kyte, Alicia; David, Syndie; Mitchell, Nicole – Journal of Teaching in Social Work, 2022
In 2019, three Black social work instructors simultaneously taught a required anti-oppressive practice (AOP) course to a cohort of undergraduate social work students. Through collective autoethnography (CAE), we sought to deepen our understanding of our experience within the classroom and how our identity as Black women was negotiated within the…
Descriptors: Racism, Social Work, Social Justice, Undergraduate Students
Pan, Yiqin; Wollack, James A. – Journal of Educational Measurement, 2021
As technologies have been improved, item preknowledge has become a common concern in the test security area. The present study proposes an unsupervised-learning-based approach to detect compromised items. The unsupervised-learning-based compromised item detection approach contains three steps: (1) classify responses of each examinee as either…
Descriptors: Test Items, Cheating, Artificial Intelligence, Identification
Deeb, Haneen; Vrij, Aldert; Leal, Sharon; Mann, Samantha – Applied Cognitive Psychology, 2021
The current experiment examined the effects of combining two interview techniques on information elicitation and lie detection in multiple interviews. Participants were interviewed online over three weeks. Two-thirds of the participants (n = 114) were presented with the model statement (MS) interview technique in Interview 1 and were asked to…
Descriptors: Interviews, Deception, Freehand Drawing, Models
Goodrich, Kristopher M.; Brammer, M. Kathryn – Journal of Multicultural Counseling and Development, 2021
Cass's (1979) model of homosexual identity formation has been used as a guideline to understand sexual identity development, although questions of its current applicability have been raised. This article critically analyzes Cass's model through a contemporary lens. To contextualize and understand the model and its implications, we review empirical…
Descriptors: Homosexuality, Identification (Psychology), Criticism, Counselor Training
Sternberg, Robert J.; Karami, Sareh – Roeper Review, 2021
We propose that wisdom should be considered in understanding, identifying, and developing skills of thought translated into action in gifted children and adults. First, we review some of the history of the gifted field and conclude that ideas about understanding, identification, and instruction are largely obsolete and based on assumptions that…
Descriptors: Gifted, Identification, Models, History

Peer reviewed
Direct link
