NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 202514
Since 202450
Laws, Policies, & Programs
Individuals with Disabilities…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 50 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Alaina C. Keim; Adriane M.F. Sanders; Thaddeus B. Rada-Bayne; David R. Earnest – Teaching of Psychology, 2025
Background: This study examined students' perceptions of and engagement with active student responding (ASR) techniques as they relate to student performance. Objective: We replicate Zayac et al.'s study on ASR methods and expand on it by using an upper-level psychology course at multiple institutions and additional measures of engagement. Method:…
Descriptors: Undergraduate Students, Student Attitudes, Psychology, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Katherine McDonald; Madison Brodeur; Ariel Schwartz – Journal of Applied Research in Intellectual Disabilities, 2025
Background: We identified participant-level risks and safeguards in social-behavioural research with adults with developmental disabilities. Method: We conducted a qualitative systematic review on risks and safeguards in peer-reviewed research with adults with developmental disabilities. We identified research reporting on risks and safeguards…
Descriptors: Adults, Developmental Disabilities, Research, Risk
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Farida Agus Setiawati; Tria Widyastuti; Kartika Nur Fathiyah; Tiara Shafa Nabila – European Journal of Psychology and Educational Research, 2024
Data obtained through questionnaires sometimes respond to the items presented by social norms, so sometimes they do not suit themselves. High social desirability (SD) in non-cognitive measurements will cause item bias. Several ways are used to reduce item bias, including freeing respondents from not writing their names or being anonymous,…
Descriptors: Social Desirability, Test Bias, Self Concept, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Elizabeth Messman; Justin Heinze; Hsing-Fang Hsieh; Nicole Hockley; Naomi Pomerantz; Alison Grodzinski; Briana Scott; Noah Goldstein; Marc Zimmerman – Health Education & Behavior, 2024
Anonymous reporting systems (ARS) have been widely implemented in schools across the United States as a violence prevention strategy. The current study systematically reviewed the published literature on ARS in U.S. schools (including public and private k-12 schools, colleges, and universities) over the past 25 years to examine the effectiveness…
Descriptors: Violence, Prevention, Elementary Secondary Education, Postsecondary Education
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Peer reviewed Peer reviewed
Direct linkDirect link
Justin R. Harker; Trent A. Petrie – Journal of American College Health, 2025
Objective: To assess athletic trainers' (ATs) perceptions regarding the importance of athletes' beliefs and athletic department stakeholders in facilitating help-seeking for mental health (MH) care. Participants: 534 ATs within collegiate athletic departments (M[subscript age] = 35.50 years; 64.2% women; 87.3% White). Methods: ATs were asked to…
Descriptors: College Students, Student Athletes, Help Seeking, Mental Health
Peer reviewed Peer reviewed
Direct linkDirect link
Alexander Skulmowski – Educational Psychology Review, 2024
Unnoticed by most, some technology corporations have changed their terms of service to allow user data to be transferred to clouds and even to be used to train artificial intelligence systems. As a result of these developments, remote data collection may in many cases become impossible to be conducted anonymously. Researchers need to react by…
Descriptors: Artificial Intelligence, Ethics, Research, Information Utilization
Peer reviewed Peer reviewed
Direct linkDirect link
Violeta Iosub; Emily Lovell; Shaun MacLean; J. Scott McIndoe – Journal of Chemical Education, 2025
Asking questions in front of a large classroom of one's peers is so intimidating that a majority of students will not participate in class in this way, hence missing out on a crucial part of the educational experience. A very easy option that has been implemented in our large enrollment classrooms, with a great effect, is outlined herein: an…
Descriptors: Questioning Techniques, Confidentiality, Technology Uses in Education, Feedback (Response)
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua M. Rosenberg; Conrad Borchers; Sondra M. Stegenga; Macy A. Burchfield; Daniel Anderson; Christian Fischer – Learning, Media and Technology, 2024
Schools and school districts use social media for a variety of reasons, but alongside the benefits of schools' social media use come potential risks to students' privacy. Using a novel dataset of around 18 million Facebook posts by schools and districts in the United States, we explore the extent to which personally identifiable information of…
Descriptors: Social Media, Elementary Schools, Secondary Schools, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Curby Alexander; Liran Ma; Ze-Li Dou; Zhipeng Cai; Yan Huang – Journal of Cybersecurity Education, Research and Practice, 2024
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality…
Descriptors: Students, Teachers, Inquiry, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Piotr Jabkowski; Aneta Piekut – Field Methods, 2024
This study analyzes the consequences of item nonresponse to the question about a household's total net income in the European Social Survey (2008-2018). We recognize two mechanisms in avoiding answering the income question: task complexity and question sensitivity, and apply multilevel logistic regressions to predict the probability of refusals or…
Descriptors: Foreign Countries, Family Income, Surveys, Social Characteristics
Peer reviewed Peer reviewed
Direct linkDirect link
S. Wessels; E. Swart – International Journal of School & Educational Psychology, 2024
School psychologists often face complex ethical and legal issues in their work, which become more challenging as the needs of students and school systems evolve. When faced with ethical dilemmas, it can be difficult for school psychologists to determine the best course of action, particularly when there is no clear solution. This study explored…
Descriptors: School Psychologists, Ethics, Foreign Countries, Decision Making
Sarah M. Hart – Sage Research Methods Cases, 2024
Composite narrative case studies are a relatively novel technique to combine multiple data points into a single vignette. This method offers an accessible option for the presentation of research findings that can engage diverse audiences. Findings presented in this manner honor qualitative commitments to preserve rich, complex, and situated…
Descriptors: Young Adults, Individualized Transition Plans, Severe Disabilities, Case Studies
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4