NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1,171 to 1,185 of 4,083 results Save | Export
Nsiah, Gabriel Kofi Boahen – ProQuest LLC, 2010
Ghana, like many other nations in recent years, has made education a top priority for national development. Despite newly developed policies, however, there remains a significant quality gap among high schools; due largely to an inequitable ratio of government's educational spending by geographic area. While most urban schools flourish with better…
Descriptors: Academic Achievement, Educational Quality, Foreign Countries, Distance Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Johnson, Genevieve Marie – Australian Journal of Educational & Developmental Psychology, 2010
Ecological systems theory assumes that child development is the consequence of ongoing reciprocal and spiraling interactions between the child and his/her microsystem (immediate home, school, and community environments). The increasing presence of digital technologies in children's immediate environments suggests the need for the proposed…
Descriptors: Rating Scales, Internet, Cognitive Development, Child Development
Peer reviewed Peer reviewed
Direct linkDirect link
Margalit, Malka; Raskind, Marshall H. – Journal of Special Education Technology, 2009
Mothers of children with learning disabilities (LD) and Attention Deficit Hyperactivity Disorder (ADHD) were notified of the possibility that their online community was going to be closed. They immediately responded with messages about the significance of the community to their lives and distress that the site would not continue to be available.…
Descriptors: Electronic Mail, Mothers, Learning Disabilities, Attention Deficit Hyperactivity Disorder
Peer reviewed Peer reviewed
Direct linkDirect link
Rickard, Kim; Rickard, Alex – Education & Training, 2009
Purpose: While information and communications technology provides new opportunities for supporting mentoring, there is a need to explore how effectively these potential benefits are being realized. This paper seeks to evaluate the effectiveness of a program in the small business context as a basis for proposing determinants of e-mentoring…
Descriptors: Program Effectiveness, Mentors, Small Businesses, Coaching (Performance)
Peer reviewed Peer reviewed
Direct linkDirect link
Margolis, Jason; Deuel, Angie – Leadership and Policy in Schools, 2009
This study looks closely at the work of five teacher leaders within a grant designed to promote middle- and high school-level content area literacy teaching and learning. Drawing from research on teacher career cycles, teacher compensation, and distributed leadership, the five teacher leaders' motivations, meanings, and approaches to teacher…
Descriptors: Rewards, Teacher Leadership, Reading Instruction, Literacy
Peer reviewed Peer reviewed
Ducheneaut, Nicolas; Bellotti, Victoria – Human-Computer Interaction, 2003
Shows how e-mail users have evolved new forms of electronic deictic references to refer to work objects and offers design suggestions for future electronic mail software. Highlights include a study of e-mail work conversations; and changing the way we talk by transforming the conversation itself into an object of conversation. (Author/LRW)
Descriptors: Computer Software, Electronic Mail
Nguyen, Chi Hong – Online Submission, 2007
The growth of the Internet and the increasing application of electronic mail in many aspects of business and educational research have urged researchers to reach different individuals across geographical borders with an obvious reduction of costs and time. While the use of email surveys in educational research, as this paper mainly argues, offers…
Descriptors: Mail Surveys, Electronic Mail, Educational Research, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Beale, Andrew V.; Hall, Kimberly R. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2007
Technology has transformed the lives of adolescents, including the ways they bully one another. Variously referred to as electronic bullying, online bullying, or cyberbullying, this new method of bullying involves the use of e-mail, instant messaging, Web sites, voting booths, and chat or bash rooms to deliberately pick on and torment others. To…
Descriptors: Electronic Mail, Bullying, Information Technology, Adolescents
Jacobs, Thomas A. – Free Spirit Publishing, 2010
The Internet age has led to a different kind of teen bullying: cyberbullying. What is cyberbullying and what can teens do about it? In "Teen Cyberbullying Investigated," Judge Tom Jacobs presents a powerful collection of landmark court cases involving teens and charges of cyberbullying and cyberharassment. This riveting, informative guide will…
Descriptors: Bullying, School Districts, Court Litigation, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Washburn, Allyson; Howell, Scott L. – Online Journal of Distance Learning Administration, 2008
This article describes how E-Mail Alerts and RSS feeds can be helpful tools for busy distance education administrators by helping them to efficiently sort through the research and news information that is now available. These tools and their respective filters and aggregators make it possible for busy distance education administrators to stay…
Descriptors: Electronic Mail, Distance Education, Educational Administration, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, James Dean; Bailey, Kathleen M. – Language Testing, 2008
In 1996, we published an article that investigated the characteristics of basic language testing courses in terms of the instructors, course characteristics, and students. The present study is designed to describe the same characteristics of basic language testing courses in 2007 and to examine how such courses have changed since 1996. To those…
Descriptors: Student Attitudes, Language Proficiency, Testing, Language Tests
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Goos, Merrilyn E.; Bennison, Anne – Journal of Mathematics Teacher Education, 2008
The aim of this study is to investigate how a community of practice focused on becoming a teacher of secondary school mathematics emerged during a pre-service teacher education programme and was sustained after students graduated and began their first year of full-time teaching in schools. Bulletin board discussions of one pre-service cohort are…
Descriptors: Preservice Teacher Education, Secondary School Mathematics, Familiarity, Educational Technology
Leidman, Mary Beth; Piwinsky, Mark J. – Online Submission, 2009
The purpose of this study was to examine the effect of electronic mail and other portable and wireless devices on the traditional out of classroom communications which take place between students and professors in colleges and universities. The environment in which higher education instruction occurs has changed dramatically in the last two…
Descriptors: Higher Education, Teacher Student Relationship, Interpersonal Communication, Electronic Mail
Al-Jarf, Reima – Online Submission, 2009
E-mail messages received from 460 graduate and undergraduate students were analyzed for types of requests, academic needs, reasons for seeking author's help, communication strategies and cultural differences. Findings showed that 47% of the undergraduate subjects sought help with assignments; 31% asked an academic question about their courses; 22%…
Descriptors: Electronic Mail, Student Needs, Graduate Students, Undergraduate Students
Pages: 1  |  ...  |  75  |  76  |  77  |  78  |  79  |  80  |  81  |  82  |  83  |  ...  |  273