NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,666 to 1,680 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Jameson, Daphne A. – Business and Professional Communication Quarterly, 2014
When Chiquita Brands considered relocating its corporate headquarters, competing cities started Twitter campaigns to influence the decision by communicating directly with the chief executive officer. As he used the new microblogging channel, some of his previously private communication became public, some personal communication became…
Descriptors: Business Communication, Communication Strategies, Social Networks, Web 2.0 Technologies
Page, Xinru Woo – ProQuest LLC, 2014
This work aims to understand real-world factors shaping behaviors and attitudes towards location-sharing social networks (LSSN), especially as to why people avoid or abandon this technology, or limit their usage. Based on interview-based qualitative research and survey-based exploratory quantitative research, I hypothesize conceptual models…
Descriptors: Social Media, Mass Media Use, Geographic Location, Information Dissemination
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Flor, Alexander Gonzalez – Open Praxis, 2013
The paper is based on the challenges encountered by the researcher while conducting a study titled "Design, Development and Testing of an Indigenous Knowledge Management System Using Mobile Device Video Capture and Web 2.0 Protocols." During the conduct of the study the researcher observed a marked reluctance from organized indigenous…
Descriptors: Open Source Technology, Educational Resources, Indigenous Knowledge, Educational Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan – Interdisciplinary Journal of E-Learning and Learning Objects, 2013
The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…
Descriptors: Social Networks, Privacy, Technology Uses in Education, Role Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Venables, Anne; Tan, Grace; Miliszewska, Iwona – Journal of Information Technology Education: Innovations in Practice, 2013
To succeed within the increasingly global context of their work environment, today's IT professional needs to be equipped with both cutting-edge technical skills and a strong repertoire of "soft" skills. An important and often unrecognized soft skill is an appreciation of how various IT issues impact upon different peoples and what…
Descriptors: Foreign Countries, Cultural Awareness, Information Technology, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Schrodt, Paul – Communication Education, 2013
Using Petronio's communication privacy management theory, this study tested the degree to which content relevance and students' comfort with instructor disclosures moderated the association between instructor disclosures (i.e., frequency and appropriateness) and credibility (i.e., competence, trustworthiness, and goodwill) in the college…
Descriptors: Privacy, College Faculty, Credibility, Self Disclosure (Individuals)
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cibangu, Sylvain K. – Information Research: An International Electronic Journal, 2013
Introduction: Just as we have created them, the new social media technologies have shaped every aspect of our societies. Meanwhile, information science has hardly addressed the ways in which these information technologies have shaped humans, and vice-versa. The major reason is the tendency and pressure to adjust (the needs of) humans to the ever…
Descriptors: Information Science, Information Science Education, Information Technology, Relevance (Education)
Peer reviewed Peer reviewed
Direct linkDirect link
Binder, Perry; Mansfield, Nancy R. – Journal of Legal Studies Education, 2013
The explosion of social networks and the growing concern over privacy in the digital age--both in the United States and Europe--have provided an opportunity to introduce students to the legal risks of using social media in the workplace. This article builds on the authors' classroom experiences and provides social media scenarios and projects that…
Descriptors: Business Administration Education, Law Related Education, Social Networks, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
McGill, Shelley – Journal of Legal Studies Education, 2013
Aaron Sorkin has a passion for words--his signature movie and television scripts are fast talking, jargon laced, word pictures that are instantly recognizable. "The Social Network," Sorkin's 2011 Academy Award Winning movie about the founding of Facebook, Inc., offers more than just witty banter; it provides an ideal teaching platform for…
Descriptors: Business Administration Education, Law Related Education, Undergraduate Students, Films
Peer reviewed Peer reviewed
PDF on ERIC Download full text
National Forum on Education Statistics, 2011
This document, "Book Three of Four: Effectively Managing LDS Data," is the third installment of this Forum series of guides on longitudinal data systems (LDS). This third book in the guide series discusses organizational issues aimed at moving the project forward and ensuring that the data are of high quality so that users may leverage…
Descriptors: Information Systems, Information Management, Data, Organization
Data Quality Campaign, 2011
As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…
Descriptors: State Policy, Data Collection, Databases, Student Records
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Mulholland, Jessica – Education Digest: Essential Readings Condensed for Quick Review, 2012
In New York's Port Washington Union Free School District, security and privacy for students, faculty, and staff coexist--thanks to security cameras with eyelids. In 2010, video cameras donated by New York-based SituCon Systems were installed in the main lobby at two of the district's seven schools. "We really haven't had the kind of incidents…
Descriptors: School Security, Video Technology, Photography, Technology Uses in Education
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Pages: 1  |  ...  |  108  |  109  |  110  |  111  |  112  |  113  |  114  |  115  |  116  |  ...  |  226