NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 6,316 to 6,330 of 27,543 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cowie, Helen; Myers, Carrie-Anne – International Journal of Emotional Education, 2014
This study with 20 university students examined perspectives in three different participant roles: the perpetrator, the target and the bystander. The purpose of the exercise was to resolve the outcome of an alleged incident of cyberbullying using a social network site via the means of a restorative conference. The findings suggest that the power…
Descriptors: Foreign Countries, Bullying, College Students, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Zhou, Xiaokang; Chen, Jian; Wu, Bo; Jin, Qun – IEEE Transactions on Learning Technologies, 2014
With the high development of social networks, collaborations in a socialized web-based learning environment has become increasing important, which means people can learn through interactions and collaborations in communities across social networks. In this study, in order to support the enhanced collaborative learning, two important factors, user…
Descriptors: Cooperative Learning, Social Networks, Behavior Patterns, Correlation
Peer reviewed Peer reviewed
Direct linkDirect link
Pinheiro, Igor Reszka; Cruz, Roberto Moraes – Creativity Research Journal, 2014
This article borrowed network analysis tools to discover how the construct formed by the set of all measures of creativity configures itself. To this end, using a variant of the meta-analytical method, a database was compiled simulating 42,381 responses to 974 variables centered on 64 creativity measures. Results, although preliminary, indicate…
Descriptors: Network Analysis, Creativity, Scores, Measurement
Peer reviewed Peer reviewed
Direct linkDirect link
Gianatassio, Heather M.; Kimberly, Claire – Journal of Family and Consumer Sciences, 2014
Working with individuals dealing with death and loss can be particularly challenging for family and consumer sciences (FCS) professionals, but what is unknown is how FCS practitioners can utilize social media to understand and assist in the mourning process. The purpose of this study was to gather information about grieving via online social…
Descriptors: Grief, Coping, Internet, Family Life Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lowe, Sarah; Stuedahl, Dagny – Journal of Learning Design, 2014
In this paper, a design experiment using Instagram as a cultural probe is submitted as a method for analyzing the challenges that arise when considering the implementation of social media within a distributed communication space. It outlines how small, iterative investigations can reveal deeper research questions relevant to the education of…
Descriptors: Design, Telecommunications, Social Networks, Museums
Peer reviewed Peer reviewed
Direct linkDirect link
Tatnall, Arthur – Education and Information Technologies, 2014
People over 65 (or older people) are a growing proportion of the population in many developed countries including Australia. In the last 10 to 12 years interest from this group in the use of Information and Communication Technologies (ICT) and the Internet has also grown considerably. ICT has much to offer older people as a means of keeping in…
Descriptors: Older Adults, Information Technology, Networks, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Root, Teri; McKay, Sandra – Journal of Education for Business, 2014
Hiring professionals are increasingly using social media sites as screening tools. The primary purpose of this study was to determine what students thought employers considered important information when researching profiles. A survey was given to students enrolled in College of Business classes at a university in the Southeast. Students were…
Descriptors: Business Administration Education, Social Networks, Internet, Employers
Peer reviewed Peer reviewed
Direct linkDirect link
Ziegler, Mary F.; Paulus, Trena; Woodside, Marianne – Adult Education Quarterly: A Journal of Research and Theory, 2014
Since informal learning occurs outside of formal learning environments, describing informal learning and how it takes place can be a challenge for researchers. Past studies have typically oriented to informal learning as an individual, reflective process that can best be understood through the learners' retrospective accounts about their…
Descriptors: Informal Education, Discourse Analysis, Recreational Activities, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Aragon, Antonette; AlDoubi, Suzan; Kaminski, Karen; Anderson, Sharon K.; Isaacs, Nelda – TechTrends: Linking Research and Practice to Improve Learning, 2014
The number of educators, administrators, and institutions that utilize social networking has increased dramatically. Many have adopted social networking in order to be up-to-date and connected with their students' learning beyond the boundaries of the classroom. However, this increase in the use of social networking in academia presents many…
Descriptors: Teaching Methods, Educational Technology, Social Networks, Social Theories
Peer reviewed Peer reviewed
Direct linkDirect link
Peterson, Robert M.; Dover, Howard F. – Marketing Education Review, 2014
Networking is a chance to interact with people, build friendships or business partners, identify opportunities, and create value. Technology has made this process easier, since individuals can readily contact others who were previously unknown. In the professional world, LinkedIn has become the standard way to build virtual and personal networks.…
Descriptors: Social Networks, Class Activities, Interpersonal Competence, Skill Development
Peer reviewed Peer reviewed
Direct linkDirect link
Omidi Najafabadi, Maryam; Mirdamadi, Seyed Mehdi; Payandeh Najafabadi, Amir Teimour – International Journal on E-Learning, 2014
The facts that the wireless technologies (1) are more convenient; and (2) need less skill than desktop computers, play a crucial role to decrease digital gap in rural areas. This study employed the Bayesian Confirmatory Factor Analysis (CFA) to design a mobile training system in rural areas of Iran. It categorized challenges, potential, and…
Descriptors: Foreign Countries, Electronic Learning, Telecommunications, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Shiroma, Eneida Oto – Journal of Education Policy, 2014
This paper focuses on the role of networks in the policy-making process in education and discusses the potential of network analysis as an analytical tool for education policy research. Drawing on publically available data from personal or institutional websites, this paper reports the findings from research carried out between 2005 and 2011.…
Descriptors: Educational Practices, Educational Policy, Foreign Countries, Network Analysis
Cheng, Jingli – ProQuest LLC, 2014
Company-hosted online user communities are increasingly popular as firms continue to search for ways to provide their customers with high quality and reliable support in a low cost and scalable way. Yet, empirical understanding of motivations for knowledge sharing in this type of online communities is lacking, especially with regard to an…
Descriptors: Motivation, Sharing Behavior, Knowledge Management, Semi Structured Interviews
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Pages: 1  |  ...  |  418  |  419  |  420  |  421  |  422  |  423  |  424  |  425  |  426  |  ...  |  1837