NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 871 to 885 of 4,056 results Save | Export
Brubaker, Noah; Leach-Murray, Susan; Parker, Sherri – Computers in Libraries, 2012
The year 2011 was the PALNI (Private Academic Library Network of Indiana) consortium's "rookie season" for the implementation of Primo, the 2010 Discovery Layer 500 race winner. In this article, the authors report on their transition to the cloud within Ex Libris Ltd.'s Primo TotalCare environment: their preparation, the steps involved…
Descriptors: Academic Libraries, Consortia, Library Networks, Information Retrieval
Peer reviewed Peer reviewed
Direct linkDirect link
Schenker, Theresa – CALICO Journal, 2012
This paper presents the findings of a six-week telecollaborative project between sixteen American students enrolled in a second-semester German class at an American university and sixteen German students enrolled in an advanced English course at a high school in Germany. Students discussed various cultural topics with their partner in two e-mails…
Descriptors: Foreign Countries, Data Analysis, English (Second Language), Intercultural Communication
Nelson, Charles – Online Submission, 2011
This paper takes a complexity theory approach to looking at language learning, an approach that investigates how language learners adapt to and interact with people and their environment. Based on interviews with four graduate students, it shows how complexity theory can help us understand both the situatedness of language learning and also…
Descriptors: Theories, Difficulty Level, Second Language Learning, Models
Clarke, Marlon – ProQuest LLC, 2011
As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors…
Descriptors: Technical Support, Individual Characteristics, Self Efficacy, Focus Groups
Akbulut, Yavuz; Cuhadar, Cem – Online Submission, 2011
The current phenomenological study addressed the reflections of preservice information technology (IT) teachers regarding their cyberbullying or victimization experiences. Fifty five preservice IT teachers at a Turkish teacher training institution were offered a lecture with the purpose of awareness-raising on cyberbullying, which was followed by…
Descriptors: Information Technology, Synchronous Communication, Victims of Crime, Social Networks
Von Drasek, Lisa – School Library Journal, 2011
It is enough to make a resourceful media specialist wonder whether she will still have a job at the end of the school year or will need to find a new one. And it is not just experienced media specialists who are anxious. A teacher completing her MLS recently wrote on LM_NET that she was worried about getting a job after graduation. With all the…
Descriptors: Web Sites, Electronic Publishing, Electronic Mail, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Wood, C.; Jackson, E.; Hart, L.; Plester, B.; Wilde, L. – Journal of Computer Assisted Learning, 2011
This paper reports on an intervention study that considered the impact of text messaging on 9- to 10-year-old children's literacy skills. One hundred and fourteen children who had never owned a mobile phone before were recruited and randomly allocated to either the intervention or control conditions. All children were pre- and post-tested on a…
Descriptors: Evidence, Spelling, Intervention, Phonological Awareness
Peer reviewed Peer reviewed
Direct linkDirect link
Catanzaro, Mary F. – Pastoral Care in Education, 2011
This article assesses the literature in relation to youth bullying in the United Kingdom, Scandinavia and North America, focusing in particular on female aggression as it is expressed in adolescent peer relationships. It addresses the escalating problems of indirect aggression, especially those involving social networking interchanges such as…
Descriptors: Bullying, Females, Prevention, Peer Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Jaakkola, Timo; Watt, Anthony – Journal of Teaching in Physical Education, 2011
The main purpose of the study was to analyze teaching styles used in Finnish physical education. Another aim was to investigate the relationships between background characteristics of teachers and use of teaching styles. The participants of the study were 294 (185 females and 109 males) Finnish physical education teachers. The teachers responded…
Descriptors: Physical Education, Class Size, Teaching Styles, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Barton, Erin E.; Kinder, Kiersten; Casey, Amy M.; Artman, Kathleen M. – Young Exceptional Children, 2011
In the rush of day-to-day tasks and the daily demands of caring for young children, little time is left for conversation between administrators and teachers. Both sides often walk out of meetings feeling like little more than paperwork has been accomplished. Likewise, professional development becomes a paperwork formality. Both administrators and…
Descriptors: Feedback (Response), Teacher Effectiveness, Teacher Administrator Relationship, Interpersonal Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Sclater, Niall – International Journal of Virtual and Personal Learning Environments, 2010
Elearning has grown rapidly in importance for institutions and has been largely facilitated through the "walled garden" of the virtual learning environment. Meanwhile many students are creating their own personal learning environments by combining the various Web 2.0 services they find most useful. Cloud computing offers new…
Descriptors: Electronic Learning, Educational Technology, Internet, Computer Software
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Federal Communications Commission, 2010
This report presents data from the "2010 E-rate Program and Broadband Usage Survey" commissioned by the Federal Communications Commission (FCC) and conducted by Harris Interactive, Inc. (Harris), an independent national marketing research firm, between February and April 2010. The primary goal of the survey was to collect data on the current state…
Descriptors: Internet, Telecommunications, Schools, Libraries
Adebiaye, Richmond – ProQuest LLC, 2010
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
Descriptors: Computer Mediated Communication, Electronic Mail, Privacy, Social Networks
Ward, Brad J. – CURRENTS, 2010
Since its launch in 2006, the social media tool Twitter has grown from a "wait-and-see" communications site to a mainstream media darling. Last year was the tipping point for this site, which is as easy to use as it is to confuse. As its popularity has grown, there has been a shift in the way Twitter is used. Early Twitter adopters would follow…
Descriptors: Organizational Communication, Audiences, Internet, Asynchronous Communication
Pages: 1  |  ...  |  55  |  56  |  57  |  58  |  59  |  60  |  61  |  62  |  63  |  ...  |  271