NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20240
Since 20230
Since 2020 (last 5 years)0
Since 2015 (last 10 years)7
Since 2005 (last 20 years)38
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 44 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
DeKay, Sam H. – Business Communication Quarterly, 2012
Most business communication textbooks treat "unfavorable" communications as written documents--denials of credit, collection requests, rejections for employment, inability to meet deadlines, etc. These written "unfavorable" documents are no longer actually written by most employees. In fact, many of these communications are computer generated and…
Descriptors: Business Communication, Verbal Communication, Employer Employee Relationship, Employee Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
DeKay, Sam H. – Business Communication Quarterly, 2010
Within the last 12 years, email has emerged as the most commonly used form of written communication in the corporate workplace. Several factors have contributed to the widespread use of email. This form of communication is generally rapid, is more economical than distributing or mailing printed documents, and permits simultaneous communication…
Descriptors: Electronic Mail, Rhetorical Invention, Case Studies, Business Communication
Warner, Michael C. – ProQuest LLC, 2019
This study examines the effectiveness of asynchronous learning in a corporate workspace. Education is the basis for success both in a corporate environment and the personal lives of the employees. The challenge is that today's skills in the corporate environment are not always available through higher education. Educating workers is a success…
Descriptors: Adult Students, Asynchronous Communication, Industrial Training, Student Needs
Zafar, Humayun – ProQuest LLC, 2010
This study investigates differences in perception between layers of management (executive, middle, and lower) and staff with regard to the influence of critical success factors (CSFs) on security risk management (SRM) effectiveness. This is an in-depth case study conducted at a Fortune 500 company. Rockart's (1979) CSF method is modified through…
Descriptors: Administrator Attitudes, Differences, Middle Management, Risk Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kálmán, Csaba; Eugenio, Esther Gutierrez – Studies in Second Language Learning and Teaching, 2015
Attribution theory (Weiner, 1985) and self-determination theory (Deci & Ryan, 1985) have been explored as contributors to L2 motivation (cf. Dörnyei, 2001) but have never been studied quantitatively in concert. In addition, students' attributions for success in learning a foreign language have never been measured through the use of a…
Descriptors: Second Language Learning, Self Determination, Learning Motivation, Statistical Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McKay, Elspeth; Vilela, Cenie – Australian Journal of Adult Learning, 2011
The purpose of this paper is to outline government online training practice. We searched individual research domains of the human-dimensions of Human Computer Interaction (HCI), information and communications technologies (ICT) and instructional design for evidence of either corporate sector or government training practices. We overlapped these…
Descriptors: Foreign Countries, Web Based Instruction, Online Courses, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Swift, Jonathan S.; Wallace, James – Journal of European Industrial Training, 2011
Purpose: This study aims to examine a German multinational that uses English as the common corporate language (CCL) for internal communications with its international subsidiaries/agencies. It examines use of English within the workplace, and problems/opportunities it presents to those who use it. Design/methodology: The questionnaire was piloted…
Descriptors: Foreign Countries, English (Second Language), Language Role, Corporations
Peer reviewed Peer reviewed
Direct linkDirect link
Ludi, Georges – Language Teaching, 2010
Ideologies and communication practices vary hugely in multilingual workplaces. On the one hand, many companies include Diversity Management in their corporate culture because there are theoretical and empirical reasons to believe that a company which employs a diverse workforce enhances its opportunities in a global marketplace whilst improving…
Descriptors: Organizational Culture, International Trade, Multilingualism, Cultural Pluralism
Peer reviewed Peer reviewed
Direct linkDirect link
Nafukho, Fredrick Muyia, Ed.; Irby, Beverly J., Ed. – IGI Global, 2015
Our increasingly globalized world is driven by shared knowledge, and nowhere is that knowledge more important than in education. Now more than ever, there is a demand for technology that will assist in the spread of knowledge through customized, self-paced, and on-demand learning. The Handbook of Research on Innovative Technology Integration in…
Descriptors: Technology Integration, Higher Education, Educational Research, Virtual Classrooms
Peer reviewed Peer reviewed
Direct linkDirect link
Dunn, Cynthia Dickel – Multilingua: Journal of Cross-Cultural and Interlanguage Communication, 2013
In recent years, politeness theory has increasingly focused on speakers' own conceptualizations of polite behavior, viewing politeness concepts as a type of language ideology. This article examines the construction of Japanese politeness concepts in the business etiquette training provided for new employees in Japanese companies. Drawing on…
Descriptors: Japanese, Pragmatics, Language Research, Business Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rodriguez, Brenda Cecilia Padilla; Armellini, Alejandro – International Review of Research in Open and Distributed Learning, 2015
Although interaction is recognised as a key element for learning, its incorporation in online courses can be challenging. The interaction equivalency theorem provides guidelines: Meaningful learning can be supported as long as one of three types of interactions (learner-content, learner-teacher and learner-learner) is present at a high level. This…
Descriptors: Interaction, Online Courses, Theories, Teacher Student Relationship
Peer reviewed Peer reviewed
PDF on ERIC Download full text
de Berly, Geraldine; McGraw, Deborah – Continuing Higher Education Review, 2010
The Syracuse University English Language Institute (ELI), housed within University College, has been offering noncredit executive English courses on a contract basis for the past 12 years. Despite its small size and limited resources, the ELI, whose main mission is to prepare international students for academic study, also manages a successful…
Descriptors: English Curriculum, Business Communication, Program Descriptions, Business English
Peer reviewed Peer reviewed
Direct linkDirect link
Feldman, Eric M. – New Horizons in Adult Education & Human Resource Development, 2015
This paper provides a resource on the impact of social media on adult learners' construction of knowledge, particularly as it pertains to adult education's role in fostering a robust democratic society. There has been an increase in the literature in recent years that explores the various aspects of social media use, such as the incivility of…
Descriptors: Social Media, Adult Learning, Epistemology, Learning Processes
Anderson, Teresa A. – ProQuest LLC, 2019
The purpose of this study was to investigate and identify andragogical leadership educational traits/competencies that are associated with effectively educating/training employees/participants. The andragogical competencies were compared with the six identified soft skills of the Lean Six Sigma Trainer. The researcher also assessed the perceived…
Descriptors: Andragogy, Corporate Education, Trainers, Employee Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Previous Page | Next Page »
Pages: 1  |  2  |  3