Publication Date
In 2025 | 7 |
Since 2024 | 48 |
Since 2021 (last 5 years) | 205 |
Since 2016 (last 10 years) | 516 |
Since 2006 (last 20 years) | 1463 |
Descriptor
Source
Author
Marttunen, Miika | 11 |
Barton, Erin E. | 9 |
Barron, Ann E. | 7 |
Descy, Don E. | 7 |
Thompsen, Philip A. | 7 |
Goldsborough, Reid | 6 |
Ivers, Karen S. | 6 |
Morgan, Nancy A. | 6 |
Tennant, Roy | 6 |
Harris, Judi | 5 |
Laurinen, Leena | 5 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 273 |
Teachers | 188 |
Administrators | 68 |
Researchers | 48 |
Media Staff | 44 |
Students | 26 |
Policymakers | 20 |
Parents | 15 |
Counselors | 8 |
Community | 3 |
Support Staff | 1 |
More ▼ |
Location
Australia | 108 |
United Kingdom | 79 |
United States | 78 |
Canada | 76 |
Japan | 49 |
California | 40 |
Turkey | 34 |
Germany | 32 |
Texas | 32 |
United Kingdom (England) | 31 |
New York | 29 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards without Reservations | 1 |
Meets WWC Standards with or without Reservations | 1 |
Does not meet standards | 2 |
Clancy, Steve – Database, 1988
Discusses the various forms of computer viruses and the threat they pose to online databases. Available protection programs are described, and a list of online sources of protection programs and news is provided. (14 references) (CLB)
Descriptors: Computer Software, Databases, Electronic Mail, Microcomputers
Moore, Cathy – Library Journal, 1987
This description of an electronic bulletin board used by the Wisconsin Interlibrary Services network to process requests covers hardware, software, costs, advantages of the system, operation, training, maintenance, and problems encountered. (MES)
Descriptors: Computer Software, Cost Effectiveness, Electronic Mail, Interlibrary Loans
Turner, Judith Axler – Chronicle of Higher Education, 1988
Many suggestions by two researchers at Rand Corporation, who published a paper on etiquette for news networks, have been incorporated into bulletin-board conventions, but with new users coming online all the time socialization is slow. Some suggestions for e-mail users are provided. (MLW)
Descriptors: Bulletin Boards, Communications, Computer Networks, Electronic Mail

Buckland, Michael K. – Information Technology and Libraries, 1987
The functions of electronic mail and online catalogs are described, and the possible uses of the two in conjunction for library purposes are explored, including notes between librarians, broadcast news, patron notifications, selective information dissemination, and interlibrary loans. (Author/CLB)
Descriptors: Electronic Mail, Information Dissemination, Library Automation, Office Automation
Williams, Gene; Mitchell, Chris – Wilson Library Bulletin, 1987
Setting up a public library bulletin board system is described as a way to attract young adult users as well as to foster awareness and use of electronic information media. Step-by-step guidelines cover hardware needed, including modems, types of software available, designing the system's contents, and maintenance and security. (EM)
Descriptors: Adolescents, Computer Software, Electronic Mail, Guidelines
Benjamin, Blair; Lee, Jay – Association of Small Computer Users in Education (ASCUE), 2005
By nearly all accounts, the Web has overwhelmingly become the primary resource for prospective students to research potential college choices. Using this medium, however, prospects are able to do their research independently and privately, without having to contact the institution via phone, mail or email to make a formal inquiry. Consequently,…
Descriptors: Internet, Educational Technology, College Choice, Electronic Mail

Tarvers, Josephine Koster; Buswell, Eric – 2000
A study examined the feasibility of e-mail tutoring at Winthrop University, a medium-sized state supported liberal arts university with limited technology access. Initially it looked at the questions of directive versus nondirective methods in tutoring, but it quickly spread to questions of submission, formatting, and strategy. A total of 26…
Descriptors: Electronic Mail, Feasibility Studies, Higher Education, Tutoring
Granello, Darcy Haag; Wheaton, Joe E. – 2003
In spite of the increased use of the Internet for data collection, there is little published research about the process of data collection online. That is, discipline specific studies publish the results of their web-based surveys in discipline-specific journals, but little information is available on the process of Internet-based data collection.…
Descriptors: Counselors, Data Collection, Electronic Mail, Research Methodology

Davis, Diane C. – Business Education Forum, 1997
A survey of members of the Information Industry Association (108 of 519 responded) found that more than 90% used the Internet and 50-90% used many other electronic communication systems. Therefore, business educators must stay abreast of the changing technologies. (Author/JOW)
Descriptors: Adults, Business Education, Computer Mediated Communication, Electronic Mail

Freed, Shirley Ann – New Horizons in Adult Education, 2003
A study examined how adult learners used a WebCT bulletin board space to construct knowledge. Metaphors and questions of possibilities were the "tools" that connected reflection, dialogue, and self-direction to create new understandings. The online space itself provided unique opportunities for self-directed learning and reflective dialogue.…
Descriptors: Adult Education, Computer Mediated Communication, Electronic Mail, Metaphors

Munter, Mary; Rogers, Priscilla S.; Rymer, Jone – Business Communication Quarterly, 2003
Presents guidelines to help businesspeople and business students become more effective and efficient in the use of e-mail. Includes the authors' experiences as instructors in diverse business schools and corporate settings. Notes that the guidelines cover: recognizing the nature of e-mail; composing e-mail; and processing and managing e-mail. (SG)
Descriptors: Business Communication, Business Education, Electronic Mail, Guidelines

Gannon-Leary, Pat – Electronic Library, 1997
As a result of litigation, a number of companies have written policies declaring the right to monitor employee electronic communication. Discusses reasons why employers monitor employee e-mail, the prevalence of monitoring in universities, use and ethics policy statements, and bills of rights statements protecting employee privacy. (PEN)
Descriptors: Electronic Mail, Ethics, Higher Education, Information Policy
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
Descriptors: Computer Networks, Computer Security, Computer Software, Corporations

Shannon, David M.; Johnson, Todd E.; Searcy, Shelby; Lott, Alan – Practical Assessment, Research & Evaluation, 2002
Studied perceptions and recommendations from 62 survey researchers about the use of electronic surveys. Reduction of costs, usefulness for prenotification and followup, and comparability with existing software were the most positive aspects cited. Limitations identified included sampling problems and confidentiality and privacy problems. (SLD)
Descriptors: Confidentiality, Cost Effectiveness, Electronic Mail, Internet
Jones, William; Dumais, Susan; Bruce, Harry – Proceedings of the ASIST Annual Meeting, 2002
This observational study investigates the methods people use in their workplace to organize Web information for re-use. Topics include bookmarking; emailing URLs; printing Web pages; differences according to workplace role and their relationship to the information; and a functional analysis to help explain differences. (Author/LRW)
Descriptors: Electronic Mail, Information Utilization, Web Sites, Work Environment