Publication Date
| In 2026 | 0 |
| Since 2025 | 18 |
| Since 2022 (last 5 years) | 157 |
| Since 2017 (last 10 years) | 467 |
| Since 2007 (last 20 years) | 1389 |
Descriptor
Source
Author
| Marttunen, Miika | 11 |
| Barton, Erin E. | 9 |
| Barron, Ann E. | 7 |
| Descy, Don E. | 7 |
| Thompsen, Philip A. | 7 |
| Goldsborough, Reid | 6 |
| Ivers, Karen S. | 6 |
| Morgan, Nancy A. | 6 |
| Tennant, Roy | 6 |
| Harris, Judi | 5 |
| Laurinen, Leena | 5 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 273 |
| Teachers | 188 |
| Administrators | 68 |
| Researchers | 48 |
| Media Staff | 44 |
| Students | 26 |
| Policymakers | 20 |
| Parents | 15 |
| Counselors | 8 |
| Community | 3 |
| Support Staff | 1 |
| More ▼ | |
Location
| Australia | 109 |
| United Kingdom | 79 |
| United States | 78 |
| Canada | 76 |
| Japan | 49 |
| California | 40 |
| Turkey | 34 |
| Germany | 32 |
| Texas | 32 |
| United Kingdom (England) | 31 |
| New York | 30 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
| Does not meet standards | 2 |
Starkman, Neal – Campus Technology, 2007
As schools adopt new and varied technologies to protect the campus community, the need to look at security tools in terms of a comprehensive, layered, and integrated strategy, becomes clear. This article discusses how schools are using these security tools.
Descriptors: Campuses, School Security, Systems Approach, Electronic Mail
Gillen, Julia; Staarman, Judith Kleine; Littleton, Karen; Mercer, Neil; Twiner, Alison – Learning, Media and Technology, 2007
Interactive whiteboards have been rapidly introduced into all primary schools under UK Government initiatives. These large, touch-sensitive screens, which control a computer connected to a digital projector, seem to be the first type of educational technology particularly suited for whole-class interaction. Strong claims are made for their value…
Descriptors: Learning Activities, Classrooms, Educational Technology, Elementary Education
Roman, Harry T. – Tech Directions, 2007
Conceptually, e-mail is not a whole lot different from regular postal mail ("snail mail"), except that it is much faster. E-mail requires three things: (1) a personal computer; (2) a telephone or communication line; and (3) an Internet provider (e-mail service account). This article provides details on how it works--plus some research activities…
Descriptors: Electronic Mail, Computers, Telecommunications, Internet
Ciocco, Ronalee; Huff, Alice – Computers in Libraries, 2007
The authors, both of whom are working at the Musselman library, relate how they are always looking for ways to improve and update their reference service. When they introduced a chat reference service to their online library services, they received only four inquiries in the entire year 2002-2003. The authors found out later that the paltry number…
Descriptors: Library Services, Reference Services, Libraries, Surveys
Newberger, Julee – 2002
This article describes the use of an eMentoring program by the Orphan Foundation of America, a nonprofit organization dedicated to helping young people move out of foster care and into adult life. The eMentoring program, which allows youth and their mentors to communicate via e-mail, helps foster youth prepare for work life by matching them with…
Descriptors: Electronic Mail, Foster Children, Mentors, Program Descriptions
Peer reviewedJedlicka, Davor; Jennings, Glen – Journal of Technology in Counseling, 2001
Investigates whether marital therapy can be conducted on the Internet using email. It was hypothesized that in the absence of "conversation of gestures," the email in itself may serve as a therapeutic tool for increasing differentiation of thoughts from emotions among highly reactive couples. With the help of eleven couples, results…
Descriptors: Counseling Techniques, Electronic Mail, Internet, Marriage Counseling
Notess, Greg R. – Online, 1992
Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…
Descriptors: Access to Information, Costs, Electronic Mail, Internet
Peer reviewedRyan, Joe – Internet Research, 1993
Provides a guide for effective Internet use by recommending resources for key activities, including getting oriented, finding a mentor, getting connected, using communication and network navigation tools efficiently, discovering Internet resources, and understanding the broader picture. Prices and network addresses are included for 184 references…
Descriptors: Electronic Mail, File Transfer Protocol, Internet, Mentors
Hazari, Sunil – Collegiate Microcomputer, 1990
Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)
Descriptors: Computer Networks, Electronic Mail, Higher Education, Telecommunications
Peer reviewedGuyer, Carolyn; Petry, Martha – Writing on the Edge, 1991
Offers an edited version of the E-mail conversation between the authors, examining their process of collaboration as they worked within a triad of existing hypertexts among which they wove a fourth new work called "Izme Pass." (SR)
Descriptors: Collaborative Writing, Electronic Mail, Higher Education, Hypermedia
Eck, Alycia – Facilities Manager, 2000
Explores the role of the uniform for custodian and maintenance employees and presents e-mail responses to questions concerning the wisdom of using uniforms, whether to purchase or rent them, and the influence of weather on changing uniform requirements. (GR)
Descriptors: Electronic Mail, Internet, Postsecondary Education, School Maintenance
Peer reviewedExtejt, Marian M. – Business Communication Quarterly, 1998
Discusses current standards for formatting and etiquette of electronic mail in the business setting. Discusses privacy and appropriate content. Notes that class assignments involving electronic mail provide practical opportunities to develop ease with this form. (SR)
Descriptors: Business Communication, Electronic Mail, Higher Education, Privacy
McDermott, Irene E. – Searcher, 1998
Discussion of spam (i.e., electronic messages mass-posted on the Internet to people who would not otherwise choose to receive them) explains what spam is and why it is a problem. A recent attempt to force America Online to lift its ban on spamming is reported, and suggestions on what individuals can do about spam are offered. (MES)
Descriptors: Advertising, Electronic Mail, Freedom of Speech, Internet
Peer reviewedBarnes, Sally – Distance Education, 2000
Discusses the use of technology for distance learning in higher education and examines the similarities and differences between face-to-face seminars and online discussions. Considers the concept of affordance in relation to information and communication technologies and distance education; and examines affordances of electronic conferencing and…
Descriptors: Distance Education, Electronic Mail, Information Technology, Teleconferencing
Peer reviewedMcKeage, Kim – College Teaching, 2001
Reports on one professor's use of integrated synchronous electronic office hours (i.e., a "chat room") with asynchronous course conferencing (i.e., email) in a class on introductory marketing. Describes its uses, limitations, benefits, potential problems, and results from a student survey. (EV)
Descriptors: Computer Mediated Communication, Electronic Mail, Higher Education

Direct link
