Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Education

A Phenomenological Study Of Resource Parents' Experiences Providing For The Educational Needs Of Children With Adverse Childhood Experiences, Skyler Nicole Wells Feb 2024

A Phenomenological Study Of Resource Parents' Experiences Providing For The Educational Needs Of Children With Adverse Childhood Experiences, Skyler Nicole Wells

Doctoral Dissertations and Projects

The purpose of this transcendental phenomenological study was to examine the lived experience that resource parents (e.g., kinship, foster, adoptive) undergo to care for the education needs of their children with adverse childhood experiences (ACEs). The theory guiding this study is Bandura’s theory on social learning (1977). Bandura explained how behaviors and skills from a model were used to guide the central research question: What are the lived experiences of resource parents caring for the educational needs of children with ACEs? Data was collected from 12 adults living in a rural county in Virginia using writing prompts, interviews, and focus …


Raising The Bar For Instructional Outcomes: Toward Transformative Learning Experiences, Brent Wilson, Patrick Parrish Mar 2016

Raising The Bar For Instructional Outcomes: Toward Transformative Learning Experiences, Brent Wilson, Patrick Parrish

Brent Wilson

Most instructional technologists understand that instruction aims to be effective, efficient, and appealing. These three quality indicators have proven useful in establishing desired outcomes. In this article the authors suggest an expanded set of indicators, with more attention to social impact, engagement, and the learner's experience. By broadening and deepening expectations, the authors hope to encourage more research on instruction, leading to powerful or transformative learning.


How To Study: The Neglected Basic, Wayne Wilcox, Brent Wilson Mar 2016

How To Study: The Neglected Basic, Wayne Wilcox, Brent Wilson

Brent Wilson

This paper examines knowledge of studying--knowing how and when to apply study strategies. Study strategies may be classified into three categories: memory strategies, comprehension strategies, and problem-solving strategies. Memory-study strategies help students remember what they study. Five attributes often characterize memory strategies: meaningfulness, organization, association, visualization, and attention. Some memory strategies include rhymes, patterns, acronyms, acrostics, the link system, the loci system, and the peg system. Comprehension strategies help students understand what they study. Activities in comprehension strategies include identifying important information (e.g., underlining main ideas or taking note of headings); paraphrasing and summarizing important information; generating examples and questions; …


Inclusive Leadership: Preparing Principals For The Role That Awaits Them, Dorothy Garrison-Wade, Donna Sobel, Connie Fulmer Sep 2015

Inclusive Leadership: Preparing Principals For The Role That Awaits Them, Dorothy Garrison-Wade, Donna Sobel, Connie Fulmer

Dorothy Garrison-Wade

Preparing administrators with the capacity to improve instruction for all learners is critical for recruiting and retaining special education teachers. However, recent research points out the need to improve skills of current and future administrators for this role. To address these concerns the special education and administrator preparation programs at a western university designed and conducted research to determine how well preservice principals were being prepared to improve instruction for all learners. To determine program improvement and training needs, researchers collected focus group and survey data from current and alumni students from both programs. Findings of this research are organized …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


The Identification Of Right Brain Children And The Application Of Teaching Strategies To Improve Their Academic Achievement, Barbara B. Stutes-Weiler Jun 1985

The Identification Of Right Brain Children And The Application Of Teaching Strategies To Improve Their Academic Achievement, Barbara B. Stutes-Weiler

Abraham S. Fischler College of Education ETD Archive

The author identified students with a right brain dominance through surveys and questionnaires. These students' past academic records were scrutinized and on the basis of repetitive low test scores, poor social and scholastic achievement and a pattern of apathetic behavior, a target group of five students was compiled for this study. Based on their mode dominance, a series of teaching strategies were created to strengthen the dominant mode and stretch the subdominant mode. The strategies were formulated for daily implementation and were specific activities that called on reaction from either the left or right hemisphere of the brain, and the …