NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 5,296 to 5,310 of 24,872 results Save | Export
Noel-Levitz, Inc, 2012
The last decade marked a dramatic change in the college search experience as students flocked to the Internet as their primary tool for researching colleges. Institutions had to transform their recruitment efforts to keep up with the online demands and expectations of prospective students. The proliferation of smartphones is transforming the…
Descriptors: Recruitment, Internet, Handheld Devices, College Bound Students
OCLC Online Computer Library Center, Inc., 2012
This new report details findings from a study OCLC conducted with libraries in mid-2011 to learn about their priorities, initiatives, thoughts on the future of their service points and the sources they use to keep up with developments in the library field. Most public library staff: (1) Anticipate that the top reason patrons are using their…
Descriptors: Library Personnel, Electronic Mail, Public Libraries, Users (Information)
Narock, Thomas William – ProQuest LLC, 2012
The World Wide Web Consortium defines a Web Service as "a software system designed to support interoperable machine-to-machine interaction over a network." Web Services have become increasingly important both within and across organizational boundaries. With the recent advent of the Semantic Web, web services have evolved into semantic…
Descriptors: Internet, Computer Networks, Shared Resources and Services, Information Management
Anderson, Derrick L. – ProQuest LLC, 2012
Traditionally scholars have used the digital divide and technology acceptance model definitions when examining why some people elect not to use certain information and communications technologies. When examining the phenomenon referred to as voluntary digital exclusion, the use of these classic definitions is woefully inadequate. They do not…
Descriptors: Information Technology, Computer Attitudes, Personal Narratives, Internet
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Oggins, Jean; Sammis, Jeffrey – International Journal of Mental Health and Addiction, 2012
In this study, 438 players of the online video game, World of Warcraft, completed a survey about video game addiction and answered an open-ended question about behaviors they considered characteristic of video game addiction. Responses were coded and correlated with players' self-reports of being addicted to games and scores on a modified video…
Descriptors: Video Games, Feedback (Response), Correlation, Surveys
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Greenwood, Grant – Journal of College Admission, 2012
Over the past few years, social networking has exploded into a massive medium that has captured the attention of a large portion of the American population. The ever-growing social networking site(s) (SNS) movement has filled a networking gap and thus, has presented higher education institutions with unique opportunities (Reid 2009) to further…
Descriptors: Marketing, Social Networks, Internet, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Bajrektarevic, Anis – E-Learning and Digital Media, 2012
Misled by a quick triumphalism of the social media, the international news agencies have confused the two: revolt and revolution. The past episodes of unrest started as a social, not a political, public revolt. Through the pain of sobriety, the protesters are learning that neither globalisation nor the McFB way of life is a shortcut to…
Descriptors: Communication (Thought Transfer), Foreign Countries, Social Networks, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hsieh, Tsui-Chuan; Yang, Chyan – Turkish Online Journal of Educational Technology - TOJET, 2012
This paper used a multi-level latent class model to evaluate whether online learning patterns exhibit regional differences and demographics. This study discovered that the Internet learning pattern consists of five segments, and the region of Taiwan is divided into two segments and further found that both the user and the regional segments are…
Descriptors: Foreign Countries, Electronic Learning, Internet, Computer Use
Peer reviewed Peer reviewed
Direct linkDirect link
Lester, David – Death Studies, 2012
This article is intended to engage others in a dialogue about the role and meaning of jokes about suicide. Types of jokes involving suicide are examined to distinguish the different types of humor involved. A sample of 118 recent political cartoons in an online website was downloaded, of which 73 concerned suicide bombers. Examples of suicide…
Descriptors: Suicide, Cartoons, Humor, Role
Peer reviewed Peer reviewed
Direct linkDirect link
Mariani, Leonardo; Micucci, Daniela – ACM Transactions on Computing Education, 2012
In academic courses, students frequently take advantage of someone else's work to improve their own evaluations or grades. This unethical behavior seriously threatens the integrity of the academic system, and teachers invest substantial effort in preventing and recognizing plagiarism. When students take examinations requiring the production of…
Descriptors: Plagiarism, Integrity, Program Effectiveness, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Lilburn, Jeff – portal: Libraries and the Academy, 2012
Recent scholarship challenges the celebratory discourse surrounding Web 2.0. This paper engages with this scholarship to examine critically the implications of academic libraries' presence within commercially owned social media spaces. It considers the apparent contradiction between work to promote the principles of open access and the idea of the…
Descriptors: Academic Libraries, Internet, Social Networks, Scholarship
Peer reviewed Peer reviewed
Direct linkDirect link
Reichow, Brian; Halpern, Jason I.; Steinhoff, Timothy B.; Letsinger, Nicole; Naples, Adam; Volkmar, Fred R. – Journal of Autism and Developmental Disorders, 2012
The World Wide Web is a common method for obtaining information on autism spectrum disorders, however, there are no guidelines for finding websites with high quality. We conducted two studies examining the characteristics and/or quality of autism websites in 2009 and 2010. We found websites with a .gov top-level domain had a statistically…
Descriptors: Autism, Internet, Web Sites, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Hertlein, Katherine M. – Family Relations, 2012
We are in an unprecedented age of technology. Few articles in family journals address online behavior, intimacy patterns, and influences on the ways couples and families communicate through technology. The purpose of this article is to use a multitheoretical model to describe the process of how technologies are affecting couple and family life.…
Descriptors: Family Life, Intimacy, Family Relationship, Career Development
Peer reviewed Peer reviewed
Direct linkDirect link
Lever-Mazzuto, Katie – Communication Teacher, 2012
Today's students live in a mobile society beset with technologies that allow them to communicate through a wide variety of mediums. Mobile phones, for example, have become the fastest growing technology in history. Students have traditionally been at the forefront of most societal changes and this recent technological influx is certainly no…
Descriptors: Student Attitudes, Norms, Internet, Behavior Standards
Pages: 1  |  ...  |  350  |  351  |  352  |  353  |  354  |  355  |  356  |  357  |  358  |  ...  |  1659