NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Goals 20001
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 62 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hui Meng; Li Ma; Lei Su; Bei Lu; Di Hou; Xiaowei Du – International Journal of Web-Based Learning and Teaching Technologies, 2024
Intangible cultural heritage is an important part of Chinese excellent traditional culture, and college dance teaching is paid more attention by researchers of physical education and computer technology. In order to help the inheritance and development of non-legacy culture in college dance teaching, this paper analyzes the influencing factors of…
Descriptors: Dance Education, Cultural Background, Telecommunications, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Travica, Bob; Hogan, Matthew – Proceedings of the ASIS Annual Meeting, 1992
Describes a study of the current state of computer networks in the countries of the former Soviet Union (X-USSR). Four wide area networks are described; network uses and services are examined; social effects of computer networks are considered; and the development of the computer and telecommunications industry in X-USSR countries is discussed.…
Descriptors: Computer Networks, Databases, Foreign Countries, Information Networks
Peer reviewed Peer reviewed
Wang, Shouhong – Internet Research, 2000
Shifting between different linkages of the partners for satisfying a need is the major characteristic of the virtual organization, and meta-management beyond the individual organizational level must be applied in order to optimize the benefit for the entire organizational network. Presents a meta-management support framework based on the…
Descriptors: Administration, Business, Computer Networks, Information Technology
Peer reviewed Peer reviewed
Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Rodgers, R. P. Channing – Journal of the American Society for Information Science, 1995
Describes the National Library of Medicine's (NLM) experimental Sourcerer project which is developing software to accept a user query, automatically identifying appropriate information resources, and facilitating connection to those sources for information retrieval. Discusses the use of the World Wide Web and the Unified Medical Language System.…
Descriptors: Computer Networks, Computer Software Development, Information Retrieval, Information Sources
Peer reviewed Peer reviewed
Carbone, Nick; And Others – Computers and Composition, 1993
Examines the ways in which writing teachers present themselves in a virtual classroom--a computer networked first-year composition classroom. Discusses how the teachers' online presence relate to their off-line, "live" presence. Suggests that differences among teacher are more important than similarities. (RS)
Descriptors: Computer Assisted Instruction, Computer Networks, Freshman Composition, Higher Education
Peer reviewed Peer reviewed
Angeles, Rebecca – Internet Research, 2001
This study seeks a practical understanding of the business, organizational, and technical components of and implementation guidelines needed to effectively deploy extranets. It aims to establish a basic conceptual framework for understanding extranet implementation guidelines. Provides a specific case using VF Playwear, Inc.'s HealthTexbtob.com, a…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Computer Oriented Programs
Jacobs, Gloria; DiMauro, Vanessa – 1995
"Active readers" are silent members of telecommunications networks who read but do not contribute. Often derided as lurkers, active readers benefit from their network participation and in turn professionally benefit others. A study, still in progress, is interviewing 20 silent participants of the LabNet community who have posted fewer…
Descriptors: Computer Networks, Computer Uses in Education, Educational Benefits, Electronic Mail
Lowery, Catherine; Franklin, Kathy K. – 1999
Researchers at the University of Arkansas at Little Rock conducted a study of faculty attitudes about the use of technology in the college classroom using electronic focus group sessions. This paper examines the electronic focus group data collection procedure. The electronic sessions were conducted in a decision-support center on campus with 13…
Descriptors: College Faculty, Computer Networks, Educational Technology, Focus Groups
Miller, Greg; Doerfert, David L. – 1995
The purpose of this descriptive study was to investigate the usefulness of an interactive communications network for agricultural education at the secondary level. The Iowa Communications Network (ICN) is a two-way full motion fiber optics telecommunications system capable of linking secondary agricultural departments throughout Iowa. The…
Descriptors: Agricultural Education, Computer Networks, Educational Cooperation, Educational Technology
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Shepherd, Michael A.; Watters, Carolyn – Proceedings of the ASIS Mid-Year Meeting, 1992
Characterizes information retrieval systems in a network environment from a user's perspective along two axes: query and presentation. Several examples of early, current, and developing information retrieval systems are considered within this framework, and Daltext, a prototype system to support research on text-based retrieval systems, is…
Descriptors: Classification, Computer Networks, Database Design, Information Networks
Peer reviewed Peer reviewed
Geffert, Bryn – Public Libraries, 1993
Description of community online systems focuses on a Freenet in Illinois called P.A.T.H. (Public Access to Heartland). Highlights include patron use; discussion groups and bulletin boards; electronic mail; reference questions; Freenet's place in public libraries; and sample reference questions answered by Freenet information providers. (five…
Descriptors: Case Studies, Community Programs, Computer Networks, Electronic Mail
Pepin, Theresa; And Others – Library Journal, 1997
This report analyzes data gathered from 29 automated library system vendors who responded to a 1996 survey. The survey also requested their perceptions of Java (an object-oriented programming language) and network computers, and issues and trends to be considered by library administrators. Contact information about the vendors is provided. (Four…
Descriptors: Computer Networks, Electronic Libraries, Library Administration, Library Automation
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5