BHE will host a one-day summit, “Hot Topics: Trends and Challenges in Behavioral Healthcare” on May 29, 2026, virtually via Zoom.. The BHE team invites you to submit an abstract for a 60-minute ...
Sacramento State's College of Education is excited to host the 29th annual Multicultural Education Conference. This year’s theme is “Beyond the Single Narrative: Fugitive Pedagogies and Educational ...
Marom, L. (2025, June 1–3). Misunderstood, overlooked, and marginalized: The construction of Jews and antisemitism in EDI policies and plans in Canadian higher education. In Centering excluded ...
Multicultural education is rooted in the civil rights movements of the 1950s and 1960s. The legacy of Brown v. Board of Education is one of the pivotal moments in modern-day history that challenged ...
You have /3 articles left. Sign up for a free account or log in. One of the best ways to practice a presentation is in front of an audience, especially when the ...
Organizers and Co-chairs: Shuhan Wang and Joy Kreeft Peyton, CELIN at Asia Society In light of the fact that more and more Chinese language and immersion programs are established and striving to ...
To be completed after your presentation, this form is designed to keep a record of all the presentations conducted by participants of the Transforming Ecology Education to 4D (TEE RCN) faculty ...
You have /5 articles left. Sign up for a free account or log in. Google Slides may be one of those rare examples of an unambiguous technological win. A technology ...
One of the most useful sessions at last week's DAMOP meeting (for me, anyway) was the invited session on "Turning Physics Students Into Physicists". This was organized by the APS Forum on Education, ...
The National Homeland Security Association (NHSA) has opened its call for presentations for the 2026 National Homeland Security Conference, scheduled for Aug. 10–13, 2026, in Louisville, Kentucky.
Oliveira, L. & Moura, C. B. (2025). Navigating Temporality in Classroom Discourse in Historical Approaches to Science: an Analytical Tool based on the Legitimation Code Theory. Paper Presentation.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results