NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,561 to 1,575 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Igbeka, J. U.; Okoroma, F. N. – Educational Research and Reviews, 2013
This study is focused on the awareness and practicability of Librarianship ethics amongst librarians. Survey questionnaire was designed to identify the degree of awareness of librarianship ethics amongst librarians in Nigeria, whether the ethics are feasible and being utilized by librarians in their day to day library management, and to find out…
Descriptors: Work Ethic, Librarians, Questionnaires, Library Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Toh, Yancy; So, Hyo-Jeong; Seow, Peter; Chen, Wenli; Looi, Chee-Kit – Learning, Media and Technology, 2013
This paper shares the theoretical and methodological frameworks that are deployed in a 3-year study to examine how Singapore primary school students leverage on mobile technology for seamless learning. This notion of seamless learning refers to the integrated and synergistic effects of learning in both formal and informal settings, which is…
Descriptors: Foreign Countries, Electronic Learning, Inquiry, Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Gray, Emily M. – Sex Education: Sexuality, Society and Learning, 2013
This paper examines the "coming out" decisions at work of four lesbian, gay and bisexual (LGB) teachers in England. It argues that such decisions are complicated by heteronormative discursive practices within schools that render LGB sexualities silent while simultaneously demanding that they are spoken. This double bind for LGB teachers…
Descriptors: Foreign Countries, Homosexuality, Self Disclosure (Individuals), Teachers
Peer reviewed Peer reviewed
Direct linkDirect link
Zirkle, Chris – Tech Directions, 2013
Providing a safe classroom and laboratory environment should be the first priority of any career-technical and technology/engineering education instructor. Doing so not only increases the opportunity for student learning, but it also keeps instructors "out of hot water" with respect to legal issues of liability. In today's litigious…
Descriptors: Safety, Laboratory Safety, Legal Responsibility, Accidents
Peer reviewed Peer reviewed
Direct linkDirect link
Vanderhoven, Ellen; Schellens, Tammy; Valcke, Martin – Journal of Media Literacy Education, 2013
The growing popularity of social network sites (SNS) is causing concerns about privacy and security, especially with teenagers, since they show various forms of unsafe behavior on SNS. It has been put forth by researchers, teachers, parents, and teenagers that school is ideally placed to educate teens about risks on SNS and to teach youngsters how…
Descriptors: Safety, Risk, Adolescents, Students
US Department of Education, 2017
The McKinney-Vento Act was originally authorized in 1987 and originally sponsored programs to provide services to the homeless. The McKinney-Vento Act is designed to address the challenges that homeless children and youths have faced in enrolling, attending, and succeeding in school. Under the McKinney-Vento Act, State educational agencies (SEAs)…
Descriptors: Federal Legislation, Homeless People, Access to Education, Equal Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stephen, Sheryl-Ann K. – Journal of Learning in Higher Education, 2014
It has been documented that Facebook is the most popular social networking site among students. Given that most students are already users of Facebook, implementing it into the curriculum provides an easy way for students to actively participate in class activities. This paper explores the idea that the use of Facebook Groups to complement…
Descriptors: Teaching Methods, Finance Occupations, Computer Software, Business Administration Education
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Kear, Karen; Chetwynd, Frances; Jefferis, Helen – Research in Learning Technology, 2014
Online communication is increasingly used in education, but it is not without problems. One significant difficulty is a lack of social presence. Social presence relates to the need for users of technology-based communication to perceive each other as real people. Low social presence can be a particular issue in text-based, asynchronous systems…
Descriptors: Communities of Practice, Interpersonal Relationship, Computer Mediated Communication, Asynchronous Communication
Walker, Kristen L.; Kiesler, Tina; Malone, Summer – Online Submission, 2016
This project involved the development of a comprehensive and educational social marketing communications plan designed to help educate middle-school-aged youth about information use and abuse online. We achieved our goal of enhancing digital information literacy while developing critical thinking and creative communication skills for…
Descriptors: Middle School Students, Privacy, Information Utilization, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kolay Akfert, Serpil – Educational Sciences: Theory and Practice, 2012
The purpose of this study is to determine the ethical dilemmas experiencing by the counsellors who work at different conditions and what they do to solve these dilemmas as well as the obstacles they have to deal with while resolving the dilemmas. This is a qualitative study in which multi-state pattern was used. For this research, 40 counsellors…
Descriptors: Foreign Countries, Ethics, Counselors, Counselor Attitudes
Wisniewski, Pamela J. – ProQuest LLC, 2012
"Interpersonal boundary regulation" is a way to optimize social interactions when sharing and connecting through Social Networking Sites (SNSs). The theoretical foundation of much of my research comes from Altman's work on privacy management in the physical world. Altman believed that "we should attempt to design responsive…
Descriptors: Social Networks, Web Sites, Privacy, Man Machine Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Tu, Chih-Hsiung; McIsaac, Marina; Sujo-Montes, Laura; Armfield, Shadow – Educational Media International, 2012
Mobile learning environments are human networks that afford the opportunity to participate in creative endeavors, social networking, organize/reorganize social contents, and manage social acts at anytime, anywhere through mobile technologies. Social acts that elicit identities, develop awareness, cement relationships, ensure connections, and…
Descriptors: Computer Mediated Communication, Interpersonal Relationship, Distance Education, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Xie, Bo; Watkins, Ivan; Golbeck, Jen; Huang, Man – Educational Gerontology, 2012
An exploratory study was conducted to answer the following questions: What are older adults' perceptions of social media? What educational strategies can facilitate their learning of social media? A thematic map was developed to illustrate changing perceptions from the initial unanimous, strong negative to the more positive but cautious, and to…
Descriptors: Educational Strategies, Comparative Analysis, Student Attitudes, Positive Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Pages: 1  |  ...  |  101  |  102  |  103  |  104  |  105  |  106  |  107  |  108  |  109  |  ...  |  226