Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Author
Bishop, Jared A. | 1 |
German, Rachel L. | 1 |
Hernández Finch, Maria E. | 1 |
Pierson, Eric E. | 1 |
Rashidi, Nasser | 1 |
Safari, Parvin | 1 |
Sander, Janay B. | 1 |
Spillman, Richard | 1 |
Wilmoth, Claire E. | 1 |
Publication Type
Journal Articles | 3 |
Tests/Questionnaires | 3 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Iran | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sander, Janay B.; Hernández Finch, Maria E.; Pierson, Eric E.; Bishop, Jared A.; German, Rachel L.; Wilmoth, Claire E. – Journal of Educational & Psychological Consultation, 2016
This is a consensual qualitative research study of the perceptions of university faculty about methods and tools to teach students the professional competency area of school-based psychological consultation, with special attention to cultural competence. The participants (n = 7) included faculty of school psychology programs located in the…
Descriptors: Cultural Awareness, School Counseling, Counseling Services, Qualitative Research
Safari, Parvin; Rashidi, Nasser – PASAA: Journal of Language Teaching and Learning in Thailand, 2015
Kumaravadivelu's (2003) introduction and development of "postmethod" led to the demise of methods and a dramatic change in the language teaching profession. In fact, it can be claimed that the arrival of postmethod pedagogy in language teaching might be the reason for the abandonment and replacement of method by context sensitive,…
Descriptors: Foreign Countries, Teaching Methods, English (Second Language), Second Language Learning
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime