NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 886 to 900 of 4,066 results Save | Export
Akbulut, Yavuz; Cuhadar, Cem – Online Submission, 2011
The current phenomenological study addressed the reflections of preservice information technology (IT) teachers regarding their cyberbullying or victimization experiences. Fifty five preservice IT teachers at a Turkish teacher training institution were offered a lecture with the purpose of awareness-raising on cyberbullying, which was followed by…
Descriptors: Information Technology, Synchronous Communication, Victims of Crime, Social Networks
Von Drasek, Lisa – School Library Journal, 2011
It is enough to make a resourceful media specialist wonder whether she will still have a job at the end of the school year or will need to find a new one. And it is not just experienced media specialists who are anxious. A teacher completing her MLS recently wrote on LM_NET that she was worried about getting a job after graduation. With all the…
Descriptors: Web Sites, Electronic Publishing, Electronic Mail, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Wood, C.; Jackson, E.; Hart, L.; Plester, B.; Wilde, L. – Journal of Computer Assisted Learning, 2011
This paper reports on an intervention study that considered the impact of text messaging on 9- to 10-year-old children's literacy skills. One hundred and fourteen children who had never owned a mobile phone before were recruited and randomly allocated to either the intervention or control conditions. All children were pre- and post-tested on a…
Descriptors: Evidence, Spelling, Intervention, Phonological Awareness
Peer reviewed Peer reviewed
Direct linkDirect link
Catanzaro, Mary F. – Pastoral Care in Education, 2011
This article assesses the literature in relation to youth bullying in the United Kingdom, Scandinavia and North America, focusing in particular on female aggression as it is expressed in adolescent peer relationships. It addresses the escalating problems of indirect aggression, especially those involving social networking interchanges such as…
Descriptors: Bullying, Females, Prevention, Peer Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Jaakkola, Timo; Watt, Anthony – Journal of Teaching in Physical Education, 2011
The main purpose of the study was to analyze teaching styles used in Finnish physical education. Another aim was to investigate the relationships between background characteristics of teachers and use of teaching styles. The participants of the study were 294 (185 females and 109 males) Finnish physical education teachers. The teachers responded…
Descriptors: Physical Education, Class Size, Teaching Styles, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Barton, Erin E.; Kinder, Kiersten; Casey, Amy M.; Artman, Kathleen M. – Young Exceptional Children, 2011
In the rush of day-to-day tasks and the daily demands of caring for young children, little time is left for conversation between administrators and teachers. Both sides often walk out of meetings feeling like little more than paperwork has been accomplished. Likewise, professional development becomes a paperwork formality. Both administrators and…
Descriptors: Feedback (Response), Teacher Effectiveness, Teacher Administrator Relationship, Interpersonal Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Sclater, Niall – International Journal of Virtual and Personal Learning Environments, 2010
Elearning has grown rapidly in importance for institutions and has been largely facilitated through the "walled garden" of the virtual learning environment. Meanwhile many students are creating their own personal learning environments by combining the various Web 2.0 services they find most useful. Cloud computing offers new…
Descriptors: Electronic Learning, Educational Technology, Internet, Computer Software
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Federal Communications Commission, 2010
This report presents data from the "2010 E-rate Program and Broadband Usage Survey" commissioned by the Federal Communications Commission (FCC) and conducted by Harris Interactive, Inc. (Harris), an independent national marketing research firm, between February and April 2010. The primary goal of the survey was to collect data on the current state…
Descriptors: Internet, Telecommunications, Schools, Libraries
Adebiaye, Richmond – ProQuest LLC, 2010
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
Descriptors: Computer Mediated Communication, Electronic Mail, Privacy, Social Networks
Ward, Brad J. – CURRENTS, 2010
Since its launch in 2006, the social media tool Twitter has grown from a "wait-and-see" communications site to a mainstream media darling. Last year was the tipping point for this site, which is as easy to use as it is to confuse. As its popularity has grown, there has been a shift in the way Twitter is used. Early Twitter adopters would follow…
Descriptors: Organizational Communication, Audiences, Internet, Asynchronous Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Halligan, Tom – Community College Journal, 2010
Keeping up with alumni has always been tough for community colleges. It's not unusual for students to transfer to other institutions and leave the area, or to attend school briefly only to be swallowed up again by the workforce. Fortunately, a new breed of social media is making alumni outreach easier. And colleges are taking advantage. This…
Descriptors: Fund Raising, Community Colleges, Alumni, Two Year Colleges
Schwartz, Harriet L. – Education Digest: Essential Readings Condensed for Quick Review, 2010
There has been much discussion about the issue of boundaries on Facebook. Some suggest faculty members can resolve potential dilemmas in relation to students by making sensible decisions about what to post and by fine-tuning privacy settings. But the challenges and opportunities run deeper. For those who want to be appropriately accessible to…
Descriptors: Electronic Mail, Social Networks, Computer Mediated Communication, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yoke, Soo Kum; Rajendran, Cecilia Bai; Sain, Noridah; Kamaludin, Puteri Nur Hidayah; Nawi, Sofwah Md; Yusof, Suhaili – English Language Teaching, 2013
Conventional corrective feedback has been widely practiced but has been said to be tedious, stressful and time consuming. As such, the focus of this study is to investigate the use of an alternative method to giving corrective feedback namely, an online corrective feedback through e-mail. In order to examine if this innovative form of corrective…
Descriptors: Foreign Countries, Feedback (Response), Computer Mediated Communication, Electronic Mail
Yasenchock, David A. – ProQuest LLC, 2013
Eighty to ninety percent of e-mail is considered unsolicited commercial communication, or spam. Not only does spam violate the privacy of users, but it also incurs societal costs associated with time-related losses, serves as a vehicle for cyber-crime, and threatens the success of e-commerce by lowering consumer confidence. This quantitative…
Descriptors: School Districts, Public Schools, Electronic Mail, Information Security
Pages: 1  |  ...  |  56  |  57  |  58  |  59  |  60  |  61  |  62  |  63  |  64  |  ...  |  272