Publication Date
In 2025 | 292 |
Since 2024 | 1457 |
Since 2021 (last 5 years) | 4874 |
Since 2016 (last 10 years) | 11820 |
Since 2006 (last 20 years) | 26343 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 2914 |
Researchers | 1797 |
Teachers | 1740 |
Policymakers | 1598 |
Administrators | 1175 |
Students | 321 |
Media Staff | 307 |
Community | 263 |
Parents | 114 |
Counselors | 76 |
Support Staff | 36 |
More ▼ |
Location
United States | 1482 |
Canada | 1400 |
Australia | 1380 |
California | 1302 |
Texas | 911 |
New York | 816 |
United Kingdom | 771 |
Florida | 713 |
Illinois | 616 |
North Carolina | 553 |
Pennsylvania | 525 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards without Reservations | 13 |
Meets WWC Standards with or without Reservations | 21 |
Does not meet standards | 24 |
Carr, Tracey; Quinlan, Elizabeth; Robertson, Susan; Gerrard, Angie – Research Synthesis Methods, 2017
Realist synthesis techniques can be used to assess complex interventions by extracting and synthesizing configurations of contexts, mechanisms, and outcomes found in the literature. Our novel and multi-pronged approach to the realist synthesis of workplace harassment interventions describes our pursuit of theory to link macro and program level…
Descriptors: Intervention, Work Environment, Bullying, Research Methodology
Letzring, Timothy D. – New Directions for Institutional Research, 2017
Data continues to grow in both importance and quantity within colleges and universities. IR professionals need to know ways data can create potential legal issues in order to be proactive rather than reactive to these situations.
Descriptors: Information Security, Colleges, Universities, Institutional Research
Valcourt, Scott A. – ProQuest LLC, 2017
The Science DMZ is a network research tool offering superior large science data transmission between two locations. Through a network design that places the Science DMZ at the edge of the campus network, the Science DMZ defines a network path that avoids packet inspecting devices (firewalls, packet shapers) and produces near line-rate transmission…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data Processing
Gongjun Xu; Sy Han Chiou; Chiung-Yu Huang; Mei-Cheng Wang; Jun Yan – Grantee Submission, 2017
Recurrent event data arise frequently in various fields such as biomedical sciences, public health, engineering, and social sciences. In many instances, the observation of the recurrent event process can be stopped by the occurrence of a correlated failure event, such as treatment failure and death. In this article, we propose a joint scale-change…
Descriptors: Failure, Change, Models, Simulation
Pamela J. Bretschneider; Stefanie Cirilli; Tracey Jones; Shannon Lynch; Natalie Ann Wilson – Sage Research Methods Cases, 2017
This case study is an introduction to the use of a document checklist as part of a qualitative research method of document review. Details are provided on the types of documents that can be utilized in a document review; the advantages and disadvantages of using document review as a research data collection method; description of how to design,…
Descriptors: Content Analysis, Documentation, Educational Research, Qualitative Research
Gurpinder Singh Lalli – Sage Research Methods Cases, 2017
This case study is aimed at postgraduate and early career researchers who wish to embark on using ethnographic techniques in educational research. The topic in question is school food and its impact upon learning. In this case, it is the social aspect which is being addressed. This research did not aim to address the nutritious element but the way…
Descriptors: Ethnography, Dining Facilities, Students, Observation
Levina, Elena Y.; Voronina, Marianna V.; Rybolovleva, Alla A.; Sharafutdinova, Mariya M.; Zhandarova, Larisa F.; Avilova, Vilora V. – International Journal of Environmental and Science Education, 2016
The research urgency is caused by necessity to develop the informational support for management of development of higher education in conditions of high turbulence of external and internal environment. The purpose of the paper is the development of methodology for structuring and analyzing datasets of educational activities in order to reduce…
Descriptors: Higher Education, Educational Administration, Information Technology, Information Management
Finch, Jannette L.; Flenner, Angela R. – College & Research Libraries, 2016
The authors generated data visualizations to compare sections of the library book collection, expenditures in those areas, student enrollment in majors and minors, and number of courses. The visualizations resulting from the entered data provide an excellent starting point for conversations about possible imbalances in the collection and point to…
Descriptors: Academic Libraries, Library Materials, Data, Data Analysis
Pruitt, Kobie – State Education Standard, 2016
Just as adults' personal lives and data are increasingly inhabiting online spaces, so are students. While this shift brings many benefits and the possibility of learning tailored to individual students' needs, it is also brings new challenges. Students create an electronic trail of information that creates an obvious concern: How can they enjoy…
Descriptors: Student Records, Safety, Computer Security, Information Security
Gray, Colin M.; Boling, Elizabeth – Educational Technology Research and Development, 2016
The exponential growth in technological capability has resulted in increased interest on the short- and long-term effects of designed artifacts, leading to a focus in many design fields on the ethics and values that are inscribed in the designs we create. While ethical awareness is a key concern in many engineering, technology, and design…
Descriptors: Educational Technology, Ethics, Values, Data Collection
Cormack, Andrew – Journal of Learning Analytics, 2016
Most studies on the use of digital student data adopt an ethical framework derived from human-subject research, based on the informed consent of the experimental subject. However, consent gives universities little guidance on using learning analytics as a routine part of educational provision: which purposes are legitimate and which analyses…
Descriptors: Data Analysis, Data Collection, Educational Research, Information Security
Louie, Josephine; Rhoads, Christopher; Mark, June – American Journal of Evaluation, 2016
Interest in the regression discontinuity (RD) design as an alternative to randomized control trials (RCTs) has grown in recent years. There is little practical guidance, however, on conditions that would lead to a successful RD evaluation or the utility of studies with underpowered RD designs. This article describes the use of RD design to…
Descriptors: Regression (Statistics), Program Evaluation, Algebra, Supplementary Education
Henderson, Michael; Selwyn, Neil – AERA Online Paper Repository, 2016
Large quantities of data are now generated, collated and processed within schools through computerized systems and other digital technologies. In response to growing concerns over the efficiency and equity of how data is used, the concept of 'open data' has emerged as a potential means of democratizing data access and use across school…
Descriptors: Data Collection, Data Analysis, Democracy, Access to Information
Johnson, Reid A. – ProQuest LLC, 2016
Data science is a broad, interdisciplinary field concerned with the extraction of knowledge or insights from data, with the classification of data as a core, fundamental task. One of the most persistent challenges faced when performing classification is the class imbalance problem. Class imbalance refers to when the frequency with which each class…
Descriptors: Comparative Analysis, Information Science, Technology, Classification
Kristin Cipollone – Sage Research Methods Cases, 2016
All research accounts are partial. Who we are--our biographies, experiences, ideological stances, and so on--affects the entirety of the research process. Who we are shapes what types of research questions we find interesting, how we frame our research objectives, how we collect data, how we analyze these data, and how we present our findings. In…
Descriptors: Qualitative Research, Research Methodology, Case Studies, Researchers