NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 121 to 135 of 172 results Save | Export
Albanese, Andrew Richard – Library Journal, 2007
A little over a year ago, press releases from the Association of American Publishers (AAP) and Cornell University touted the release of new "jointly drafted" copyright guidelines to govern what has become a tense subject: the use of electronic course reserves, or e-reserves. Since the mid-1990s, e-reserves have offered libraries and academic…
Descriptors: Higher Education, Copyrights, Course Content, Academic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
van der Heide, Sjors; van der Sijde, Peter C.; Terlouw, Cees – Higher Education Management and Policy, 2008
How do European universities organise the knowledge transfer (KT) task? We consider the institutional organisation of knowledge transfer as encompassing 1) the knowledge transfer office structure, i.e. the way universities have embedded and organise their KT activities, 2) the focus towards the KT task, linked to the KT strategy, and 3) the KT…
Descriptors: Transfer of Training, Knowledge Management, Delivery Systems, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Kinman, Virginia – Journal of Electronic Resources Librarianship, 2009
Digital resources play an increasingly important role in academic libraries, which must demonstrate their value to the institution and their impact on student learning outcomes in new and more compelling ways. This study examines 5 years of vendor-supplied e-resource usage data in conjunction with other library and institution measures. Results…
Descriptors: Metric System, Academic Libraries, Library Research, Online Vendors
Cockrum, Colton Dwayne – ProQuest LLC, 2010
This study was designed to explore the phenomenon of college students who illegally file-share. The main research question was, "What are the experiences of college students who file-share and what are their perspectives on the moral and legal implications for doing so?" Data were collected from six students using interviews, focus…
Descriptors: College Students, Sharing Behavior, Focus Groups, Moral Issues
Kerr, Paulette A. – ProQuest LLC, 2010
This research was conducted to investigate the relationships between conceptions and practice of information literacy in academic libraries. To create a structure for the investigation, the research adopted the framework of Argyris and Schon (1974) in which professional practice is examined via theories of action, namely espoused theories and…
Descriptors: Lifelong Learning, Interviews, Academic Libraries, Information Sources
Foster, Andrea L. – Chronicle of Higher Education, 2008
Mark Brazaitis worries that his university may sabotage the literary careers of his students. As director of the creative-writing program at West Virginia University, Mr. Brazaitis oversees the training of about 30 graduate students, who hope to become published authors. At the end of their three years in the program, they hand in their magnum…
Descriptors: Graduate Students, Masters Theses, Writing for Publication, Student Publications
Peer reviewed Peer reviewed
Direct linkDirect link
Kist, William – Journal of Adolescent & Adult Literacy, 2008
This Digital Literacies column describes the dilemma many new teachers feel as their uses of social networking sites pose conflicts with institutional cautions regarding educators' participation in these kinds of online activities. Pre-service teachers discuss the challenges of marrying their own out-of-school literacies to mandated professional…
Descriptors: Social Networks, Preservice Teachers, Online Systems, Electronic Publishing
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Canadian Association of University Teachers, 2008
Fair Dealing is the right, within limits, to reproduce a substantial amount of a copyrighted work without permission from, or payment to, the copyright owner. Its purpose is to facilitate creativity and free expression by ensuring reasonable access to existing knowledge while at the same time protecting the interests of copyright owners. It is…
Descriptors: Foreign Countries, Copyrights, Intellectual Property, Guidelines
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Johnson, Ian M.; Cano, Virginia – Information Research: An International Electronic Journal, 2008
Introduction: This paper draws on the results of studies undertaken between 2004 and 2007 as part of Project REVISTAS, supported by the European Commission's ALFA Programme. Method: A variety of methods was employed over the life of the project, including analysis of directories, a survey of universities in the region believed to be offering…
Descriptors: Information Science Education, Electronic Publishing, Quality Control, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Selwyn, Neil – Assessment & Evaluation in Higher Education, 2008
Whilst the copying, falsification and plagiarism of essays and assignments has long been a prevalent form of academic misconduct amongst undergraduate students, the increasing use of the internet in higher education has raised concern over enhanced levels of online plagiarism and new types of "cyber-cheating". Based on a self-report…
Descriptors: Undergraduate Students, Plagiarism, Cheating, Internet
Briggs, Linda L. – Campus Technology, 2008
The leap in wireless LAN standards to 802.11n is a WiFi upgrade so new it has not yet garnered final approval from the standards committee. Although that approval will not come until next year (vendors are currently building to a "pre-n" standard), there are plenty of notebook computers out there capable of running 802.11n. That means students…
Descriptors: Computer Networks, Telecommunications, Information Technology, Standards
Bugeja, Michael J. – Education Digest: Essential Readings Condensed for Quick Review, 2008
An article this author wrote about avatar harassment and assault in Second Life (SL) inspired a considerable response after it was published. Perhaps the most notable reply was from Linden Lab, the company that created the virtual-reality world. In his initial essay ("The Chronicle of Higher Education," September 14, 2007; "The Education Digest,"…
Descriptors: Higher Education, Civil Rights, Computer Simulation, Technology Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lwehabura, Mugyabuso Julius; Stilwell, Christine – Journal of Librarianship and Information Science, 2008
A study was undertaken in four Tanzanian universities to investigate the status and practice of information literacy (IL) so as to determine the best ways of introducing or improving IL programmes. This article reports on the findings related to challenges and opportunities that could influence the effective implementation and introduction of IL…
Descriptors: Undergraduate Students, Information Literacy, Educational Opportunities, Barriers
Data Quality Campaign, 2010
State education data systems have often been described as data rich but information poor. Historically, these systems were created for compliance purposes and, therefore, designed and managed as information technology projects, but a culture change is under way. Educators and other stakeholders are beginning to value data as a tool to inform…
Descriptors: Information Technology, Information Needs, Stakeholders, Data Collection
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12