Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
International Journal of… | 3 |
Author
Huang, Nan-Ching | 1 |
Huang, Tien-Chuan | 1 |
Keh, Huan-Chao | 1 |
Mutsuura, Kouichi | 1 |
Nakayama, Minoru | 1 |
Shaw, Ruey-Shiang | 1 |
Shih, Ru-Chu | 1 |
Yamamoto, Hiroh | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Adult Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nakayama, Minoru; Mutsuura, Kouichi; Yamamoto, Hiroh – International Journal of Distance Education Technologies, 2017
Aspects of learning behavior during two types of university courses, a blended learning course and a fully online course, were examined using note-taking activity. The contribution of students' characteristics and styles of learning to note-taking activity and learning performance were analyzed, and the relationships between the two types of…
Descriptors: Notetaking, Learning Strategies, Online Courses, Performance Based Assessment
Shih, Ru-Chu – International Journal of Distance Education Technologies, 2017
In recent years, the rapid advancement of information technology has had a great impact on our daily life and changed the world in which we operate; in particular, mobile devices have become more portable and powerful than ever. As a result, mobile-assisted language learning (MALL) and ubiquitous learning have been widely adopted in a variety of…
Descriptors: English for Special Purposes, Electronic Learning, College Students, Language Laboratories
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security