NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 91 to 105 of 4,079 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dinneen, Jesse David; Krtalic, Maja – portal: Libraries and the Academy, 2020
This article discusses how e-mail and e-mail archives can serve as legacy for individuals, families, and societies. Toward this end, it outlines the scope and scale of e-mail as a tool and a task, and gives an overview of the many individual, group, and institutional factors in e-mail management that influence the form and contents of e-mail…
Descriptors: Electronic Mail, Preservation, Archives, Information Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
John M. Norris; Shoko Sasayama; Michelle Kim – ETS Research Report Series, 2023
Accomplishing a communication task in the real world requires the ability not only to do the task per se but also to manage aspects of the context in which it occurs. For this reason, simulations of target language use contexts have been incorporated into the design of communicative language tests as a way of enhancing the authenticity of…
Descriptors: Electronic Mail, Writing (Composition), Task Analysis, Student Evaluation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tracy L. Ediger – HAPS Educator, 2023
Teaching with empathy is an approach that values the emotional quality of both teacher and student experiences. To incorporate teacher empathy into our teaching practice, we must first recognize that distress is inevitable, and that building skills to deal with stressful situations is an important investment in our future mental health.…
Descriptors: Empathy, Altruism, Teacher Student Relationship, Mental Health
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hanyu Jia – Journal of Second Language Acquisition and Teaching, 2023
To explore email request patterns in the institutional context of university settings, this study combines speech act research with conversation analysis methods to examine how native speakers of American English and native speakers of Chinese formulate email requests to faculty. 100 authentic email requests sent by Chinese and American students…
Descriptors: Electronic Mail, Speech Acts, Native Speakers, North American English
Curran, Sue Ann Cecilia – ProQuest LLC, 2022
The purpose of learning analytics is to improve and optimize learning using student data (Siemens, 2013). An early alert warning is learning analytics designed to promote student success (Baneres et al., 2019; Foung, 2019; Lawson et al., 2016; Villano et al., 2018). An early alert has an intervention component that includes, at minimum, an email…
Descriptors: Failure, At Risk Students, Learning Analytics, Intervention
Yahna Kawa'a – ProQuest LLC, 2022
Technology has been brought into the educational milieu changing the way teachers and parents communicate. It allows teachers and parents to communicate conveniently while also facilitating the sharing of a variety of media (i.e., photos or video). Photos paint a visual picture of learning in the classroom, allowing families a glimpse into their…
Descriptors: Special Education, Students with Disabilities, Photography, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Ni Zhang; Hsin Yi Tseng; Jasmine Thai; Pranuthi Pagidipati; Chulwoo Park; Nikita Madan; Huda Assaf; Sarah Ahmed; Yoshitaka Iwasaki – Journal of American College Health, 2024
Objectives: During the early COVID-19 pandemic, college students had to switch to an online learning and online communication environment facing the chances of information overload, misinformation or conflicting information about COVID-19. This study aims to assess the communication needs that have arisen among college students to shed light on…
Descriptors: COVID-19, Pandemics, Prevention, Communication Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Canfield, Casey Inez; Fischhoff, Baruch; Davis, Alex – Metacognition and Learning, 2019
Every electronic message poses some threat of being a phishing attack. If recipients underestimate that threat, they expose themselves, and those connected to them, to identity theft, ransom, malware, or worse. If recipients overestimate that threat, then they incur needless costs, perhaps reducing their willingness and ability to respond over…
Descriptors: Deception, Electronic Mail, Metacognition, Self Esteem
Peer reviewed Peer reviewed
Direct linkDirect link
Dawar, Deepak – Journal of Information Systems Education, 2023
For most beginners, learning computer programming is a complex undertaking. Demotivation and learned helplessness have been widely reported. In addition to the subject's complexity, low in-class involvement has been linked to poor student performance. This work introduces a novel instructional technique called Student-Driven Probe Instruction…
Descriptors: Computer Science Education, Programming, Introductory Courses, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Vareberg, Kyle R.; Vogt, Olivia; Berndt, Maranda – Education and Information Technologies, 2023
This project explores the impacts of emojis on students' impressions when used in a course welcome email. We adopt a 4 x 3 factorial design to determine how different emojis (i.e., [winking face emoji], [face-with-tears-of-joy emoji], [tongue-sticking-out face emoji]) impact students' impressions of credibility, immediacy, and liking. Data from…
Descriptors: Students, Teachers, Communication (Thought Transfer), Student Attitudes
Hamzah Ahmad A. Kuriri – ProQuest LLC, 2023
Language is a tool for communication. People use it when they converse with each other. One way to comprehend what is being said is based on understating the intended meanings of the conversation, or what is called the underlined meanings (pragmatics). Pragmatic studies how different meanings are conveyed, depending on the utterances provided. A…
Descriptors: College Students, College Faculty, English Language Learners, Language Teachers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kyte, Sarah Blanchard; Collins, Elizabeth; Deil-Amen, Regina – NACADA Journal, 2020
As academic advisors help students navigate academic challenges toward a degree, seemingly mundane interactions have the potential to shape students' beliefs about themselves and their abilities. This study examines whether subtle cues within messages from advisors may help students develop what Carol Dweck calls a growth mindset--the belief that…
Descriptors: Academic Advising, Self Esteem, Student Attitudes, Cues
Hao-Jan Luh – ProQuest LLC, 2020
Decades of research has shown that teachers' classroom management practices are critical for students' performance in class. Despite the development, evaluation, and dissemination of classroom management practices, teachers struggle to implement these practices and need implementation supports. To address this issue, there has been a growth of…
Descriptors: Electronic Mail, Student Behavior, Educational Games, Classroom Techniques
Peer reviewed Peer reviewed
Direct linkDirect link
Daengsi, Therdpong; Pornpongtechavanich, Phisit; Wuttidittachotti, Pongpisit – Education and Information Technologies, 2022
Cybersecurity is crucial at present because cyber threats (e.g., phishing) have become a very common occurrence in everyday life. A literature review showed that there are no studies based on cybersecurity awareness which involved a large number of Thai users. Thus, this research focused on the cybersecurity awareness of approximately 20,000…
Descriptors: Information Security, Computer Security, Employees, Finance Occupations
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  272