NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20242
Since 2021 (last 5 years)3
Since 2016 (last 10 years)6
Since 2006 (last 20 years)12
Audience
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 12 results Save | Export
Robert Babirad – Knowledge Quest, 2024
School librarians have a critical role to play in supporting the use of Ed Tech within our schools. It is an ever-changing field. Additionally, it is often the school librarian who has the unique responsibility of introducing and sharing new technology with their school community. However, school librarians also have the added responsibility of…
Descriptors: School Libraries, Librarians, Library Role, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ferguson, Daniel E.; Nichols, T. Philip – International Journal of Qualitative Studies in Education (QSE), 2021
In field-based research, masking practices, as well as the general practice of relegating historical context to abstracted 'site descriptions' in a paper's methodology section, can produce a tacit inattention to historical specificity. By juxtaposing two case studies of schools, this article examines the ways school sites are haunted by…
Descriptors: Privacy, Educational Research, History, Qualitative Research
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Renata Kochut; Thomas Brady – International Society for Technology, Education, and Science, 2024
This paper examines the Individualized Credit for Prior Learning (CPL) process in business education. It highlights its role in accrediting students' experiential learning and bridging practical experience with academic credit. This research then recommends solutions that include AI tools, advisor training, and centralized resource hubs. Most…
Descriptors: Business Education, Artificial Intelligence, Technology Uses in Education, Credits
Peer reviewed Peer reviewed
Direct linkDirect link
Murphy, Tonia Hap – Journal of Legal Studies Education, 2019
Business law and legal environment textbooks typically devote a page or two to the tort of invasion of privacy, describing the four versions of this tort, including "appropriation of identity." The Clarkson textbook notes that "An individual's right to privacy normally includes the right to the exclusive use of her or his…
Descriptors: Torts, Privacy, Publicity, Civil Rights
Peer reviewed Peer reviewed
Direct linkDirect link
Warnick, Bryan R.; Bitters, Todd A.; Falk, Thomas M.; Kim, Sang Hyun – Educational Policy, 2016
Teacher use of social networking sites such as Facebook has presented some ethical dilemmas for policy makers. In this article, we argue that schools are justified in taking action against teachers when evidence emerges from social networking sites that teachers are (a) doing something that is illegal, (b) doing something that reflects badly on…
Descriptors: Social Media, Mass Media Use, Ethics, Teacher Attitudes
Fox, Christine; Jones, Rachel – State Educational Technology Directors Association, 2018
This publication highlights how state policies and guidance are supporting the transformation to personalized learning through digital instructional materials. Specifically, the report includes personalized learning approaches and the policies and processes around the selection, curation, procurement, professional learning and funding of digital…
Descriptors: State Policy, Individualized Instruction, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal – Information Systems Education Journal, 2012
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
Descriptors: Social Networks, Privacy, Information Security, Student Attitudes
Mulholland, Jessica – Education Digest: Essential Readings Condensed for Quick Review, 2012
In New York's Port Washington Union Free School District, security and privacy for students, faculty, and staff coexist--thanks to security cameras with eyelids. In 2010, video cameras donated by New York-based SituCon Systems were installed in the main lobby at two of the district's seven schools. "We really haven't had the kind of incidents…
Descriptors: School Security, Video Technology, Photography, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Kregenow, Julia; Rogers, Michael; Constas, Mark – Astronomy Education Review, 2010
We discuss collecting data simultaneously from many different instruments, including both qualitative and quantitative sources. A list of instruments used is provided, and data collection methods are described. Many practical logistical concerns are discussed, warning of potential pitfalls to be avoided. This article is intended to be a practical…
Descriptors: Educational Research, Data Collection, Measures (Individuals), Statistical Analysis
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Giroux, Henry A. – Policy Futures in Education, 2009
For young people it just gets worse. Ten years after the Columbine tragedy, the debate over school safety has clearly shown that educators, parents, politicians, and the mainstream media have created the conditions in which young people have increasingly become the victims of adult mistreatment, indifference, neglect, even violence. The tragic…
Descriptors: School Safety, Violence, Young Adults, Youth
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security