NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
J. S. Hardin; G. Sarkis; P. . URC – Journal of Statistics Education, 2015
We use the Enron email corpus to study relationships in a network by applying six different measures of centrality. Our results came out of an in-semester undergraduate research seminar. The Enron corpus is well suited to statistical analyses at all levels of undergraduate education. Through this article's focus on centrality, students can explore…
Descriptors: Network Analysis, Electronic Mail, Undergraduate Study, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Halligan, Tom – Community College Journal, 2010
Keeping up with alumni has always been tough for community colleges. It's not unusual for students to transfer to other institutions and leave the area, or to attend school briefly only to be swallowed up again by the workforce. Fortunately, a new breed of social media is making alumni outreach easier. And colleges are taking advantage. This…
Descriptors: Fund Raising, Community Colleges, Alumni, Two Year Colleges
Peer reviewed Peer reviewed
Direct linkDirect link
Mayberry, John; Hargis, Jace; Boles, Larry; Dugas, Alex; O'Neill, Daniel; Rivera, Ajna; Meler, Monika – Active Learning in Higher Education, 2012
Appropriate use of instructional technology can be an elusive quest for many faculty members. The iTouch is one of the latest technologies available to us, yet there is little literature on its use and effectiveness to support learners in their learning. Six new faculty members from various disciplines elected to integrate the device in their own…
Descriptors: Educational Technology, Teacher Attitudes, Handheld Devices, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Genova, Gina L. – Business Communication Quarterly, 2009
Employers have legitimate business interests in monitoring workplace Internet use: to minimize legal exposure, to increase productivity, and to avoid proprietary information loss. Since employees arguably have no expectation of privacy in their work on employers' computers, there are few grounds for complaint if they are disciplined for straying…
Descriptors: Employees, Electronic Mail, Expectation, Privacy
Miller, Jerold D.; Hufstedler, Shirley M. – Australian Teacher Education Association, 2009
Cyberbullying is a global problem with a wide range of incidents reported in many countries. This form of bullying may be defined as harassment using technology such as social websites (MySpace/Facebook), email, chat rooms, mobile phone texting and cameras, picture messages (including sexting), IM (instant messages), or blogs. Cyberbullying…
Descriptors: Web Sites, Electronic Publishing, Action Research, Suicide