NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 76 to 90 of 315 results Save | Export
Clarke, Alan – Adults Learning, 2007
Information and communication technology (ICT) has the potential to give individuals considerable freedom and choice about where and when they learn. The learning can form part of a structured learning experience or be self-directed. It can be as part of a group interacting through communication technologies or individually locating and judging…
Descriptors: Learning Experience, Information Technology, Independent Study, Educational Resources
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Roman, Harry T. – Tech Directions, 2007
Conceptually, e-mail is not a whole lot different from regular postal mail ("snail mail"), except that it is much faster. E-mail requires three things: (1) a personal computer; (2) a telephone or communication line; and (3) an Internet provider (e-mail service account). This article provides details on how it works--plus some research activities…
Descriptors: Electronic Mail, Computers, Telecommunications, Internet
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Peer reviewed Peer reviewed
Direct linkDirect link
Giles, Rebecca McMahon – Childhood Education, 2008
In our modern world of cellular phone calls, text messaging, and electronic mail, letter writing has become a lost art. What better way to motivate today's youth to experience the pleasure of "snail mail" than by reading a tale told through a series of such correspondence? The winning combination of a good story line and entertaining…
Descriptors: Letters (Correspondence), Electronic Mail, Youth, Writing (Composition)
Peer reviewed Peer reviewed
Direct linkDirect link
Correia, Ana-Paula – British Journal of Educational Technology, 2008
This study looks at how an information and communication technologies (ICT)-rich environment impacts team conflict and conflict management strategies. A case study research method was used. Three teams, part of a graduate class in instructional design, participated in the study. Data were collected through observations of team meetings, interviews…
Descriptors: Instructional Design, Conflict, Conflict Resolution, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Peer reviewed Peer reviewed
Barnes, Sally – Distance Education, 2000
Discusses the use of technology for distance learning in higher education and examines the similarities and differences between face-to-face seminars and online discussions. Considers the concept of affordance in relation to information and communication technologies and distance education; and examines affordances of electronic conferencing and…
Descriptors: Distance Education, Electronic Mail, Information Technology, Teleconferencing
Peer reviewed Peer reviewed
Direct linkDirect link
Roach, Joy L.; Anderson, Marcia A. – Delta Pi Epsilon Journal, 2007
In light of today's large amount of written workplace communication, this study attempted to reveal information regarding the quality in which business messages are encoded on the job. Data were gathered through a questionnaire administered to a sample of 1994-2004 MBA graduates of three AACSB-accredited programs. Findings suggest that business…
Descriptors: Business Communication, Writing Skills, Questionnaires, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Falvo, David A.; Johnson, Ben F. – TechTrends: Linking Research and Practice to Improve Learning, 2007
This paper explores the use of learning management systems (LMS) at colleges and universities in the United States of America. The study explores which systems are in use including both commercial and self-developed systems. The findings are based upon a random sample of 100 of the approximately 2,000 institutions of higher learning in the United…
Descriptors: Universities, Management Systems, Information Technology, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Mastrodicasa, Jeanna – New Directions for Student Services, 2008
In this article, the author focuses on technology use related to campus crisis and shows the impact that newer technologies have on making the world seem much smaller and united. When crises occur, such as at Virginia Tech shootings or Hurricane Katrina, students across the United States and even the world reach out to one another through new…
Descriptors: Crisis Management, Information Technology, Campuses, Colleges
Kuehn, Scott A. – 1990
The computer user has played an active part in uncovering changes brought on with microcomputer technology. Electronic mail (or "E-mail"), which enables users to send and receive messages through bulletin board services ("BBSs"), is often considered one innovation of the computer revolution. A BBS provides opportunities for…
Descriptors: Communication (Thought Transfer), Electronic Mail, Heuristics, Information Technology
Peer reviewed Peer reviewed
Goldsborough, Reid – Teacher Librarian, 2005
E-mail has never been a foolproof way of sending information. It would make sense to follow-up with a phone call if something crucial is sent to make sure it has arrived. This is particularly true if a large file or files are to be sent by way of an e-mail attachment. ISPs typically limit attachments in received e-mails to 2-10 megabytes, which is…
Descriptors: Information Transfer, Electronic Mail, Internet, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Blummer, Barbara A. – Journal of Web Librarianship, 2007
Faculty publication databases or author bibliographies offer libraries an opportunity to provide services to users. Initially, these databases remained initiatives of special libraries in the health-sciences fields. Librarians used the publication information derived from these databases to compile lists for annual reports. However, the advent of…
Descriptors: Electronic Mail, Special Libraries, Databases, Librarians
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  21