NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)24
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 102 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Uddin, Shahadat; Jacobson, Michael J. – Computers & Education, 2013
Email is considered as one of the most widely accepted computer-mediated communication tools among university students. Evidence from the present literature shows that students make a significant amount of their course-related communications (e.g. discuss a topic with peers) using this tool. This study explores the dynamics of an email…
Descriptors: Computer Mediated Communication, Communications, Social Networks, Network Analysis
Parry, Marc – Chronicle of Higher Education, 2013
The e-mail drill was one of numerous mind-training exercises in a unique class designed to raise students' awareness about how they use their digital tools. Colleges have experimented with short-term social-media blackouts in the past. But Ms. Hill's course, "Information and Contemplation," goes way further. Participants scrutinize their…
Descriptors: Video Technology, Internet, Electronic Mail, Consciousness Raising
Peer reviewed Peer reviewed
Direct linkDirect link
Hunter, Eileen – Educational Horizons, 2012
The Amy Hestir Student Protection Act, also known as the Missouri Facebook Law, forbids exclusive or private conversations between teachers and students on Facebook. A judge has granted an injunction against it, but this issue has sparked a debate among teachers about whether they should be Facebook friends with current students and in what ways…
Descriptors: Electronic Mail, Teacher Student Relationship, Learner Engagement, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Richards, Jack C. – RELC Journal: A Journal of Language Teaching and Research, 2015
There are two important dimensions to successful second language learning: what goes on inside the classroom and what goes on outside of the classroom. While language teaching has always been seen as a preparation for out-of-class uses of language, much of the focus in language teaching in the past has typically been on classroom-based language…
Descriptors: Second Language Learning, Literacy, Second Language Instruction, Teacher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Patchin, Justin W.; Hinduja, Sameer – Youth & Society, 2011
Bullying at school is a common problem facing youth, school officials, and parents. A significant body of research has detailed the serious consequences associated with bullying victimization. Recently, however, a new permutation has arisen and arguably become even more problematic. "Cyberbullying," as it has been termed, occurs when youth use…
Descriptors: Bullying, Internet, Electronic Mail, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Jo, Il-Hyun – Asia Pacific Education Review, 2009
This study investigates the effect of the presentation of social network diagrams on virtual team members' interaction behavior via e-mail. E-mail transaction data from 22 software developers in a Korean IT company was analyzed and depicted as diagrams by social network analysis (SNA), and presented to the members as an intervention. Results…
Descriptors: Intervention, Network Analysis, Social Networks, Communities of Practice
Quinn, Kelly Ann – ProQuest LLC, 2012
Research on internet communication technologies by midlife and older adults has received less attention than the young, yet rapid gains in the use internet media suggest older adults have become significant users. Adoption of specific applications has emerged in patterns distinct from younger users, reflecting the different experiences and…
Descriptors: Information Technology, Internet, Older Adults, Adults
Konieczny, Piotr – ProQuest LLC, 2012
Information and communication technologies (ICTs) have empowered non-state social actors, notably, social movements. They were quick to seize ICTs in the past (printing presses, television, fax machines), which was a major factor in their successes. Mass email campaigns, blogs, their audio- and video- variants (the podcasts and the videocasts),…
Descriptors: Information Technology, Social Change, Social History, Online Surveys
Levine, Emily L. – ProQuest LLC, 2013
The purpose of this study was to examine parents' perceptions of their role in supervision of their children's use of technology and their reported responses to events in which their children are cyberbullying oppressors, victims, or bystanders. The theoretical perspectives such as Bronfenbrenner's (1979) ecological theory,…
Descriptors: Bullying, Computer Mediated Communication, Parent Role, Child Rearing
Akbulut, Yavuz; Cuhadar, Cem – Online Submission, 2011
The current phenomenological study addressed the reflections of preservice information technology (IT) teachers regarding their cyberbullying or victimization experiences. Fifty five preservice IT teachers at a Turkish teacher training institution were offered a lecture with the purpose of awareness-raising on cyberbullying, which was followed by…
Descriptors: Information Technology, Synchronous Communication, Victims of Crime, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2011
Quora (www.quora.com) is a contemporary, web-based take on reference. Users post questions within Quora and other users answer the questions. Users can vote for and against answers (or not vote at all). It is users asking questions of friends and strangers and then sorting through the results. If the model sounds familiar, it's because it is.…
Descriptors: Electronic Mail, Internet, Users (Information), Libraries
Weir, Paul – ProQuest LLC, 2012
The purpose of this study was to determine the communication technologies preferred by school based administrators. This study surveyed and interviewed 96 school based administrators in a mid-sized suburban school system. The data show that individual emails, email lists, and cell phone technologies had the highest percentage effectiveness ratings…
Descriptors: School Based Management, Administrator Attitudes, Preferences, Communication Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Furlong, John; Davies, Chris – Oxford Review of Education, 2012
The paper presents findings from a large-scale mixed methods study of young people's uses of new technologies at home to address a number of key conceptual issues in understanding the home as context for learning. First it is argued that young people's engagement with new technologies is fundamentally bound up with their own identity. It then goes…
Descriptors: Informal Education, Young Adults, Youth, Educational Technology
Reich, Brian – New England Journal of Higher Education, 2009
As media digitizes, fragments and moves closer to the audience, the information and experiences become more a reflection of the community than a product delivered to the audience. The very nature of how people get and share information and experience things has changed, so naturally the individuals and organizations who create, consume and share…
Descriptors: Audiences, Higher Education, Internet, Electronic Mail
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7