Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 18 |
Since 2006 (last 20 years) | 100 |
Descriptor
Electronic Mail | 315 |
Information Technology | 315 |
Internet | 125 |
Higher Education | 94 |
Telecommunications | 69 |
Foreign Countries | 67 |
Computer Mediated… | 63 |
Computer Uses in Education | 62 |
Educational Technology | 55 |
Computer Networks | 50 |
Information Networks | 44 |
More ▼ |
Source
Author
Alexander, Melody W. | 2 |
Anderson, Marcia A. | 2 |
Clarke, Alan | 2 |
Johnson, Doug | 2 |
Persichitte, Kay A. | 2 |
Roman, Harry T. | 2 |
Schrum, Lynne | 2 |
Smith, Peter, Ed. | 2 |
Abbott, Chris | 1 |
Adams, Sharon | 1 |
Akbulut, Yavuz | 1 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 29 |
Administrators | 15 |
Teachers | 15 |
Media Staff | 5 |
Researchers | 3 |
Students | 3 |
Counselors | 1 |
Parents | 1 |
Policymakers | 1 |
Location
Australia | 11 |
Canada | 6 |
United Kingdom | 5 |
United States | 4 |
Illinois | 3 |
Pennsylvania | 3 |
United Kingdom (England) | 3 |
China | 2 |
France | 2 |
Germany | 2 |
Hong Kong | 2 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
First Amendment | 1 |
Freedom of Information Act | 1 |
Assessments and Surveys
Program for International… | 2 |
Aging Semantic Differential | 1 |
Motivated Strategies for… | 1 |
National Survey of Student… | 1 |
Study Process Questionnaire | 1 |
Test of English as a Foreign… | 1 |
What Works Clearinghouse Rating
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Akbulut, Yavuz; Cuhadar, Cem – Online Submission, 2011
The current phenomenological study addressed the reflections of preservice information technology (IT) teachers regarding their cyberbullying or victimization experiences. Fifty five preservice IT teachers at a Turkish teacher training institution were offered a lecture with the purpose of awareness-raising on cyberbullying, which was followed by…
Descriptors: Information Technology, Synchronous Communication, Victims of Crime, Social Networks
Masterman, Elizabeth; Shuyska, Jane Alexen – Learning, Media and Technology, 2012
Taught Master's students have been largely overlooked in research into learners' engagement with digital technologies. This article reports work to redress this imbalance, in which an extended email correspondence was conducted with 23 Master's students. Specifically, it investigates (1) the extent to which these students start their courses both…
Descriptors: Foreign Countries, Electronic Learning, Electronic Mail, Computer Literacy
Danner, R. B.; Pessu, C. O. A. – Journal of Information Technology Education: Research, 2013
Today's fast-paced world is becoming increasingly characterized by technology driven communication, which has transformed the world into a large global connected community with ever-increasing outreach of information and communication technology (ICT). Technology plays an increasingly important role in people's lives, and it is envisaged that…
Descriptors: Foreign Countries, Information Technology, Telecommunications, Undergraduate Students
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2011
Quora (www.quora.com) is a contemporary, web-based take on reference. Users post questions within Quora and other users answer the questions. Users can vote for and against answers (or not vote at all). It is users asking questions of friends and strangers and then sorting through the results. If the model sounds familiar, it's because it is.…
Descriptors: Electronic Mail, Internet, Users (Information), Libraries
Weir, Paul – ProQuest LLC, 2012
The purpose of this study was to determine the communication technologies preferred by school based administrators. This study surveyed and interviewed 96 school based administrators in a mid-sized suburban school system. The data show that individual emails, email lists, and cell phone technologies had the highest percentage effectiveness ratings…
Descriptors: School Based Management, Administrator Attitudes, Preferences, Communication Strategies
Firmin, Michael W.; Firmin, Ruth L.; Orient, Katlyn M.; Edwards, Anna J.; Cunliff, Jennifer M. – Educational Media International, 2012
We report the results of a qualitative research study conducted with university students regarding their phenomenological perspectives of BlackBerry use. Three key themes inductively emerged throughout the interview and analysis process regarding self-perceptions college students reported regarding their own BlackBerry use. First, students offered…
Descriptors: Qualitative Research, Student Attitudes, College Students, Handheld Devices
Chase, Carla A. – Educational Gerontology, 2011
Intergenerational interactions have demonstrated some success at improving attitudes of college students toward older adults. This quasiexperimental study involved undergraduate college students paired with older adults for a six-week e-mail exchange. Student attitudes toward older adults were measured pre- and posttest with Polizzi's revised…
Descriptors: Control Groups, Undergraduate Students, Intervention, Student Attitudes
Desai, Mayur S.; Hart, Jeff; Richards, Thomas C. – Journal of Instructional Psychology, 2009
E-mail is mandatory tool of communications any business to survive in the 21st century. It is imperative that Information technology (IT) managers monitor and make sure that the e-mail systems are used properly. In order to organize a systematic process for proper use of email an administrator must have an input into the development of appropriate…
Descriptors: Electronic Mail, Information Technology, Administrators, Administrator Attitudes
Roman, Harry T. – Technology Teacher, 2010
It is all about serving the customer. That is how capitalism plays out. It finds a market need and then creates a product or service to address that need. The Baby Boomer generation, all 76 million, will be retiring soon. Eventually, some may find it very hard to move about and do their routine food shopping. In this article, the author's…
Descriptors: Baby Boomers, Daily Living Skills, Communication Skills, Purchasing
Furlong, John; Davies, Chris – Oxford Review of Education, 2012
The paper presents findings from a large-scale mixed methods study of young people's uses of new technologies at home to address a number of key conceptual issues in understanding the home as context for learning. First it is argued that young people's engagement with new technologies is fundamentally bound up with their own identity. It then goes…
Descriptors: Informal Education, Young Adults, Youth, Educational Technology
Reich, Brian – New England Journal of Higher Education, 2009
As media digitizes, fragments and moves closer to the audience, the information and experiences become more a reflection of the community than a product delivered to the audience. The very nature of how people get and share information and experience things has changed, so naturally the individuals and organizations who create, consume and share…
Descriptors: Audiences, Higher Education, Internet, Electronic Mail
Dyrli, Kurt O. – District Administration, 2009
We are at the start of a revolution in the use of computers, one that analysts predict will rival the development of the PC in its significance. Companies such as Google, HP, Amazon, Sun Microsystems, Sony, IBM, and Apple are orienting their entire business models toward this change, and software maker SAS has announced plans for a $70 million…
Descriptors: Elementary Secondary Education, Computers, Educational Technology, School Districts
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Carnevale, Dan – Chronicle of Higher Education, 2008
Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…
Descriptors: Electronic Mail, Information Technology, Professional Services, Internet