NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brenner, Philip S. – Field Methods, 2019
In today's survey climate, many individuals doubt the legitimacy of survey invitations. Phishing, an Internet-based fraud that tricks users into disclosing private information, has the potential to further erode the perceived legitimacy of e-mailed survey invitations and harm cooperation. However, no study has tested the effect of phishing on…
Descriptors: Response Rates (Questionnaires), Experiments, Credibility, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Pantas, Susanna; Miller, Sean A.; Kulkarni, Shanti J. – Journal of Teaching in Social Work, 2017
Social work students created a community activism project to raise awareness about trauma prevalence and impact. Trauma theory describes silencing as the mechanism that hinders individual and community healing. Therefore, students sought to create an interactive opportunity to heighten trauma visibility on campus. They created a physical mailbox…
Descriptors: Activism, Social Work, Counselor Training, Trauma
Peer reviewed Peer reviewed
Direct linkDirect link
Christofides, Emily; Wood, Eileen; Benn, Amanda Catherine; Desmarais, Serge; Westfall, Krista – Mentoring & Tutoring: Partnership in Learning, 2017
Disclosure is a critical element of interpersonal relationships and individuals are often evaluated on what they share with others, whether in personal, professional, or learning contexts. Technology now allows for many different outlets for communicating with other people. We used experimental methods to explore the impact of communication medium…
Descriptors: Mentors, Peer Relationship, Research Design, Student Surveys
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Fang; Wang, Shudong – Turkish Online Journal of Educational Technology - TOJET, 2014
This research investigates East Asian students' perceptions towards e-learning privacy. The survey was first carried out in Japan (N1 = 255) and China (N2 = 307) in 2009. In 2012 the same survey was conducted again in these two countries but with different participants (N3 = 175, N4 = 63). To survey in different countries is to verify whether…
Descriptors: Foreign Countries, Student Attitudes, Educational Technology, Electronic Learning
Carnevale, Dan – Chronicle of Higher Education, 2008
Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…
Descriptors: Electronic Mail, Information Technology, Professional Services, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
McCaughey, Martha – Academe, 2003
When armed police officers, with no warrant, confiscated and searched the computer from this author's state university office, she began to cross-examine her relationship to computers and to investigate professors' computer privacy at public universities. She had violated no university policy. She had simply received an anonymous e-mail (an e-mail…
Descriptors: Academic Freedom, Womens Studies, Institutional Autonomy, Rape