NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20253
Since 202441
Since 2021 (last 5 years)195
Laws, Policies, & Programs
Supplemental Nutrition…2
G I Bill1
What Works Clearinghouse Rating
Does not meet standards1
Showing 76 to 90 of 195 results Save | Export
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hanyu Jia – Journal of Second Language Acquisition and Teaching, 2023
To explore email request patterns in the institutional context of university settings, this study combines speech act research with conversation analysis methods to examine how native speakers of American English and native speakers of Chinese formulate email requests to faculty. 100 authentic email requests sent by Chinese and American students…
Descriptors: Electronic Mail, Speech Acts, Native Speakers, North American English
Curran, Sue Ann Cecilia – ProQuest LLC, 2022
The purpose of learning analytics is to improve and optimize learning using student data (Siemens, 2013). An early alert warning is learning analytics designed to promote student success (Baneres et al., 2019; Foung, 2019; Lawson et al., 2016; Villano et al., 2018). An early alert has an intervention component that includes, at minimum, an email…
Descriptors: Failure, At Risk Students, Learning Analytics, Intervention
Yahna Kawa'a – ProQuest LLC, 2022
Technology has been brought into the educational milieu changing the way teachers and parents communicate. It allows teachers and parents to communicate conveniently while also facilitating the sharing of a variety of media (i.e., photos or video). Photos paint a visual picture of learning in the classroom, allowing families a glimpse into their…
Descriptors: Special Education, Students with Disabilities, Photography, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Ni Zhang; Hsin Yi Tseng; Jasmine Thai; Pranuthi Pagidipati; Chulwoo Park; Nikita Madan; Huda Assaf; Sarah Ahmed; Yoshitaka Iwasaki – Journal of American College Health, 2024
Objectives: During the early COVID-19 pandemic, college students had to switch to an online learning and online communication environment facing the chances of information overload, misinformation or conflicting information about COVID-19. This study aims to assess the communication needs that have arisen among college students to shed light on…
Descriptors: COVID-19, Pandemics, Prevention, Communication Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Dawar, Deepak – Journal of Information Systems Education, 2023
For most beginners, learning computer programming is a complex undertaking. Demotivation and learned helplessness have been widely reported. In addition to the subject's complexity, low in-class involvement has been linked to poor student performance. This work introduces a novel instructional technique called Student-Driven Probe Instruction…
Descriptors: Computer Science Education, Programming, Introductory Courses, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Vareberg, Kyle R.; Vogt, Olivia; Berndt, Maranda – Education and Information Technologies, 2023
This project explores the impacts of emojis on students' impressions when used in a course welcome email. We adopt a 4 x 3 factorial design to determine how different emojis (i.e., [winking face emoji], [face-with-tears-of-joy emoji], [tongue-sticking-out face emoji]) impact students' impressions of credibility, immediacy, and liking. Data from…
Descriptors: Students, Teachers, Communication (Thought Transfer), Student Attitudes
Hamzah Ahmad A. Kuriri – ProQuest LLC, 2023
Language is a tool for communication. People use it when they converse with each other. One way to comprehend what is being said is based on understating the intended meanings of the conversation, or what is called the underlined meanings (pragmatics). Pragmatic studies how different meanings are conveyed, depending on the utterances provided. A…
Descriptors: College Students, College Faculty, English Language Learners, Language Teachers
Peer reviewed Peer reviewed
Direct linkDirect link
Hendrickson, Peggy Bell – College and University, 2021
In this digital age, how do institutions know what documents to accept and from whom? This year's school closures, distance learning, online education, and other upheavals have made it even more critical for institutions to ensure that they are accepting official academic records from valid sources. Typically, receiving official documents…
Descriptors: Information Dissemination, Computer Mediated Communication, Academic Records, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Daengsi, Therdpong; Pornpongtechavanich, Phisit; Wuttidittachotti, Pongpisit – Education and Information Technologies, 2022
Cybersecurity is crucial at present because cyber threats (e.g., phishing) have become a very common occurrence in everyday life. A literature review showed that there are no studies based on cybersecurity awareness which involved a large number of Thai users. Thus, this research focused on the cybersecurity awareness of approximately 20,000…
Descriptors: Information Security, Computer Security, Employees, Finance Occupations
LeJeune, Lauren M.; Lemons, Christopher J.; Hokstad, Silje; Aldama, Rebeca; Naess, Kari-Anne B. – Topics in Early Childhood Special Education, 2022
Young children with Down syndrome (DS) often demonstrate impaired oral vocabulary development; however, few intervention studies have focused on this population. One promising method to improve the oral vocabulary of young children with DS may be to train their parents to intervene at home. In this study, we used tele-education methods (e.g.,…
Descriptors: Oral Language, Vocabulary Development, Down Syndrome, Parent Education
Peer reviewed Peer reviewed
Direct linkDirect link
Shann, Steve; Macken-Horarik, Mary; Edwards, CeCe – Changing English: Studies in Culture and Education, 2021
What do we see when we observe an excellent English lesson? What's going on in the room? Perhaps what stands out is a collaborative making of meanings inspired by stimulating texts. Perhaps what's most important is an ever-deepening knowledge about, and facility with, the many ways that language works. Maybe what we're seeing is a carefully…
Descriptors: Poetry, English Instruction, Teaching Methods, Language Usage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chang, Ching-Wen; Farha, Nicholas – International Journal of Technology in Teaching and Learning, 2021
The focus of this study was to evaluate the use of the Blackboard™ App by students in traditional and online learning environments. The participants in this study were students in a first-year college orientation course, and undergraduate and graduate students enrolled in educational technology (EDT) courses, all at a 4-year public university in…
Descriptors: Handheld Devices, Integrated Learning Systems, College Freshmen, Undergraduate Students
Glazier, Rebecca A. – Johns Hopkins University Press, 2021
More students than ever before are taking online classes, yet higher education is facing an online retention crisis; students are failing and dropping out of online classes at dramatically higher rates than face-to-face classes. Grounded in academic research, original surveys, and experimental studies, "Connecting in the Online…
Descriptors: Online Courses, College Students, College Faculty, Teacher Student Relationship
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13