NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 61 to 75 of 315 results Save | Export
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Goss, S.; Anthony, K. – British Journal of Guidance & Counselling, 2009
Counselling and psychotherapy has been influenced by technology for over 50 years. During this time, the rate at which ways that technology of one kind or another can assist therapists and counsellors has seemed to increase exponentially. This paper introduces and summarises contributions to the subject of technological enhancements or extensions…
Descriptors: Computer Mediated Communication, Computer Simulation, Counseling Techniques, Psychotherapy
Peer reviewed Peer reviewed
Direct linkDirect link
Jo, Il-Hyun – Asia Pacific Education Review, 2009
This study investigates the effect of the presentation of social network diagrams on virtual team members' interaction behavior via e-mail. E-mail transaction data from 22 software developers in a Korean IT company was analyzed and depicted as diagrams by social network analysis (SNA), and presented to the members as an intervention. Results…
Descriptors: Intervention, Network Analysis, Social Networks, Communities of Practice
Young, Jeffrey R. – Chronicle of Higher Education, 2008
Cloud computing, one of the latest technology buzzwords, is so hard to explain that Google drove a bus from campus to campus to walk students through the company's vision of it. After students sat through a demo at computers set up nearby, they boarded the bus and got free T-shirts. The bus only stopped at colleges that had already agreed to hand…
Descriptors: Higher Education, Internet, Information Technology, Electronic Mail
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Weissmann, Deborah – ProQuest LLC, 2010
Although much as been written about information technologies and politics, less is known about how information is handled in congressional personal offices. What happens when a constituent sends an email to their Congressman? How does a Senator get information about the pros and cons of a proposed bill? A study was conducted to understand the…
Descriptors: Information Technology, Information Management, Federal Legislation, Legislators
Peer reviewed Peer reviewed
Direct linkDirect link
Ling, Lai Ming; Nawawi, Nurul Hidayah Ahamad – Campus-Wide Information Systems, 2010
Purpose: This study aims to examine the ICT skills needed by a fresh accounting graduate when first joining a tax firm; to find out usage of electronic tax (e-tax) applications in tax practice; to assess the rating of senior tax practitioners on fresh graduates' ICT and e-tax applications skills; and to solicit tax practitioners' opinion regarding…
Descriptors: Foreign Countries, Taxes, Knowledge Level, College Graduates
Peer reviewed Peer reviewed
Direct linkDirect link
Mairn, Chad – Journal of Web Librarianship, 2010
Web 2.0 has made information more accessible and offers opportunities to make library resources more visible. This article presents several strategies for incorporating libraries and library resources into Web sites and course management systems. The tools presented are appropriate for many types of libraries and work with most Web-based systems.…
Descriptors: Management Systems, Libraries, Internet, Web Based Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Hagler, Barbara E.; Erthal, Margaret; Walzer, Dona; Anderson, Marcia A. – Delta Pi Epsilon Journal, 2009
Objective: This research was conducted to determine if relationships exist among college students' business email message productivity score and (a) email message quality score, (b) text keying method used to create email message, and (c) self-reported college English grade. Background: Email is increasingly the communication channel preferred for…
Descriptors: Productivity, College English, Writing (Composition), Business Communication
McAnally-Salas, Lewis; Espinosa-Gomez, Erika Judith; Lavigne, Gilles – Online Submission, 2011
The rapid development of ICT (information technology and communication) in the last two decades has changed society substantially as a whole. For higher education institutions, the external environment pressure to incorporate ICT in their educational and administrative processes has forced them to invest in resources for infrastructure and…
Descriptors: Online Courses, Information Technology, Teaching Methods, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Lan, Yu-Feng; Sie, Yang-Siang – Computers & Education, 2010
With the rapid development of mobile technologies, mobile learning has become a new trend in education. A better understanding of how to effectively use communication technologies to improve mobile learning is important. The purpose of this paper is to evaluate the media richness of various message delivery methods in the proposed m-learning…
Descriptors: Electronic Learning, Distance Education, Educational Environment, Teaching Methods
Warlick, David – Learning & Leading with Technology, 2009
Personal learning networks (PLNs) are not new. People have long relied on their families, friends, colleagues, and acquaintances to supplement their knowledge about the world. But the times are changing. Information and communication technologies (ICT), including an ever-growing repertoire of open source applications, have freed content from the…
Descriptors: Internet, Social Networks, Technological Advancement, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Beale, Andrew V.; Hall, Kimberly R. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2007
Technology has transformed the lives of adolescents, including the ways they bully one another. Variously referred to as electronic bullying, online bullying, or cyberbullying, this new method of bullying involves the use of e-mail, instant messaging, Web sites, voting booths, and chat or bash rooms to deliberately pick on and torment others. To…
Descriptors: Electronic Mail, Bullying, Information Technology, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Dooly, Melinda – ReCALL, 2009
This article describes follow-up research aimed at exploring the long-term impact on participants of a teacher training course that integrated a variety of projects focusing on ICT use in language teaching. Internet in education is often promoted for its features that allow for new opportunities for constructivist approaches in the classroom.…
Descriptors: Constructivism (Learning), Program Effectiveness, Teacher Competencies, Teacher Education
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  21