626 Search Results for Online Education Research Method Response Initial
Size/Cooperative Learning & it's effects on participation
Action Research Question
Will cooperative learning have a significantly positive impact on smaller or larger classes?
The purpose of this study was to investigate if cooperative learni Continue Reading...
Chronology of the Internet's Development
When the internet search titan Google stated a "mission to organize the world's information and make it universally accessible and useful," this vision statement encapsulated both the scope of the company's s Continue Reading...
Social Psychology of Hate Groups
Content Analysis of the Social Psychology of Hate Groups
Over a decade ago, it was already apparent that the Internet had advantages for social organization on the part of marginalized groups -- and that some of the Continue Reading...
If police, along with others in society, perceive high risk sex offenders as humans who possess the potential to be rehabilitated, then incidences of possible discrimination against these individuals might decrease. This in turn, the researcher cont Continue Reading...
(Hackers Chronology,
2006).
1989
The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club.
"Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing li Continue Reading...
Accounting
The Impact of Distance Learning in Accounting Higher Education
This paper is intended as an Introduction to a research study in to the impact of distance learning on the teaching of accounting in higher education. The context of the rese Continue Reading...
business2community.com/social-media/2012s-ten-worst-social-media-Disaster-0370309
Using contemporary illustrative examples from academic literature and reputable business publications, discuss the concept of "Social Business" and the resultant oppo Continue Reading...
Children With Conduct Disorder
It has been suggested that the following three treatments are the most conducive for helping children who have behavior related problems:
Family Therapy?
This treatment is focused towards the changes that have to be Continue Reading...
g. politicians, movie and rock stars, etc.). Indeed, the combination of social networking sites and an abundance of cellular services and phones has even changed the socio-political landscape in countries that do not have an open or democratic regime Continue Reading...
82).
Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actua Continue Reading...
Again, the presidential campaign acted as a catalyst for technology adoption, and led to first-time social networking users getting online. It also led to existing users creating additional profiles as well.
On the third most significant variable i Continue Reading...
Generally, online students need to have a high level of self-motivation for their studies. Being aimed towards the adult, working student body, Strayer attracts students who are not motivated only by the subject matter of their studies, but also by Continue Reading...
(Snyder & DeBono quoted in Kjeldal 2003, Introduction section, ¶ 6).
The results from the study Kjeldal (2003) conducted with 70 participants in two stages suggest that the word association responses high self-monitors (HSMs) produce refle Continue Reading...
During this penultimate period of violence under Rojas, the violence that wracked Colombia assumed a number of different characteristics that included an economic quality as well as a political one with numerous assassinations taking place. These w Continue Reading...
Also, it is almost impossible to assess the classes' collective level of interest from email, papers, and responses, for a particular lesson. Interactive technology, even video conferencing, lacks the cohesive nature of one-on-one interaction in the Continue Reading...
(Pan, 1999; paraphrased)
The point at which it is generally considered acceptable to stop testing has as its basis two criteria for stop-testing criteria which are those of: (1) when a threshold has been reached with the reliability; and (2) when t Continue Reading...
Assurance Program
Why/How to create an Information Assurance
Just as paramount as the availability and access to information is significant in every company or business outfit, certain concerns always come to the fore: the kind of information is t Continue Reading...
TESOL: Materials and Course Design
A situation analysis, giving all details available before the course begins:
New comers of the TESOL school scheme will be assessed for their English language proficiency by the teachers assigned by TESOL (Teachin Continue Reading...
This highlights the seriousness of the need for proper wound care in long-term care facilities, demonstrating the extent to which the nurse must define and provide oversight to standards in this area.
What steps should be taken to ensure proper wou Continue Reading...
The goals at which this process is aimed can concentrate on creating benefits primarily for one party or on creating benefits for both parties.' (van der Pluijm and Melissen, 2007, p.1)
Multiple-sided city diplomacy is a "diplomatic process in whic Continue Reading...
To this point, Chouliarki (2000) argues that "the facilitation of deliberative processes among audiences is a matter not only of changing institutional arrangements (towards a regulation of marketized media) but also of changing the mode of articula Continue Reading...
There is no formula to fall back on when trying to address the real needs and perceived needs of various elements in the organizational hierarchy: hence the challenge for the administrator.
The administrative budget is often the aspect of the onlin Continue Reading...
Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Continue Reading...
Figure 2:
Dell Inc. Marketing and Manufacturing Process Integration
Based on analysis of Sources: (Kapuscinski, Zhang, Carbonneau, Moore, Reeves, 2004) (Gunasekaran, Ngai, 2009) (Bilek, 2010)
Discussion of Current Business Issues
Today Dell suf Continue Reading...
The primary target market for Facebook is between the ages of 22-34. The secondary target market is between 35-54.
The strengths are that it is addictive, has a clean layout is open platform and is a real-world network (unlike Myspace). It has rela Continue Reading...
For countries such as the U.S. And France, these needs can be reasonably expected to relate to the respective national cultures involved. For instance, in their book, Education in France, Corbett and Moon (1996) report, "An education system needs to Continue Reading...
Today, email is still used very heavily in business and personal communications and related applications. However, the additional convenience and immediacy of new technology (especially cell phones) combined with the networking potential of the new Continue Reading...
This denotes that Japanese culture had been significantly altered
both by its defeat at the hands of the United States and by the occupation
which were to follow. But in reality, the changes in Japan would only be a
first chapter in the narrative of Continue Reading...
But, significantly, the category "politics and history" is the second most popular at 15 per cent" (Cohen, 2008).
Consensus vs. Credentials -- Scholarship implies a certain level of expertise on a given subject. The public must trust its sources, a Continue Reading...
Lack of accountability, transparency and integrity, ineffectiveness, inefficiency and unresponsiveness to human development remain problematic (UNDP).
Poverty remains endemic in most Gulf States with health care and opportunities for quality educat Continue Reading...
1997: School Technology and Readiness Report: From Pillars to Progress The CEO Forum on Education and Technology
9. 1999: School Technology and Readiness Report. Professional Development: A Link to Better Learning The CEO Forum on Education and Tec Continue Reading...
Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitatio Continue Reading...
Tuberculosis
Causative agent
Tuberculosis is an infectious disease of animals and humans. The most common causative agent of the disease is a bacterium a mycobacteria known as Mycobacterium tuberculosis. This bacterium was first discovered by Rober Continue Reading...
234). Culturally, trainers may simply be paying more attention to girls' injuries due to our culture's tendency to protect females more than males (Tierney, et al., 2005, p. 278) and/or boys may simply under-report concussions due to "macho" tendenc Continue Reading...
Pandemic Flu
Apart from the seasonal influenza epidemics caused by antigenic drifts, a significant change in the virus's virulence through antigenic shifts has been a major source of concern for healthcare professionals. These new strains may reach Continue Reading...
teacher instructional technology literacy instruction improve elementary (K-5) student achievement reading vocabulary? Create a qualitative research scenario phenomenology approach.
Using phenomenology
Does the use of instructional technology impr Continue Reading...
Academic Library Quality Services
Academic Libraries are held to a higher standard because they are used by so many people for research purposes. They are utilized by college students and business people researching ideas and theories and they are u Continue Reading...
The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all.
At present, telecommunica Continue Reading...
If teachers fail to design connected scaffolds than the class will develop only limited capabilities. He explains that this can be done by choosing only those scaffolding tools which have similar structures, assignment objectives, and interactive s Continue Reading...