NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive14
Tests/Questionnaires14
Journal Articles7
Speeches/Meeting Papers1
Audience
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karst, Nathaniel; Slegers, Rosa – PRIMUS, 2019
Many of the applied mathematics courses we teach touch upon a range of rich and important ethical issues -- issues that, for a number of reasons, are rarely openly discussed in class. In this work, we describe a sequence of activities co-designed and co-taught by philosophy and mathematics faculty in the hopes of bridging the divide between the…
Descriptors: Team Teaching, Ethics, Mathematics Instruction, Technology
Vogels, Emily A.; Rainie, Lee; Anderson, Janna – Pew Research Center, 2020
This report is a "Future of the Internet" canvassing Pew Research Center and Imagining the Internet Center have conducted together to get expert views about important digital issues. In this case the questions focused on the future of democracy, the problems digital technology has created and possible solutions to those problems. Pew…
Descriptors: Innovation, Technological Advancement, Democracy, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pomykalski, James J. – Information Systems Education Journal, 2017
Many IS courses address the issues of ethical decision making and privacy through full course or section of a larger course. In this paper, the author discusses the development of a series of activities in an IS2010.07 course. The primary purpose of these activities is to raise awareness by the students of issues dealing with the collection,…
Descriptors: Privacy, Ethics, Information Science, Social Responsibility
Peer reviewed Peer reviewed
Direct linkDirect link
Fossey, Richard – Journal of College and University Student Housing, 2018
College students who reside in campus dormitories at public universities have a reasonable expectation of privacy in their dorm rooms that is protected by the fourth amendment; and officials cannot search these rooms for law enforcement purposes without a valid warrant. Non-students, however, have no such reasonable expectation of privacy in…
Descriptors: College Students, Public Colleges, Privacy, Dormitories
National Center for Homeless Education, 2022
Each year, instead of living with a parent or legal guardian, thousands of students live on their own or reside with someone who serves as a caregiver. The caregiver may be a relative, friend, school employee, or other individual. Some caregivers provide little to no support for youth staying with them, while others, especially with younger…
Descriptors: Homeless People, Caregivers, Caregiver Role, Access to Education
Peer reviewed Peer reviewed
Direct linkDirect link
Canto, Angela I.; Cox, Bradley E.; Osborn, Debra; Becker, Martin Swanbrow; Hayden, Seth – Journal of College and University Student Housing, 2017
Resident Assistants (RAs) are often faced with working and living among residents who are struggling, in distress, and, at times, in crisis. This article provides a primer on identifying residents in crisis as well as the tasks faced when working with students in transition and crisis. A discussion of the prevalence of distress reported by…
Descriptors: College Students, College Housing, Resident Advisers, Stress Variables
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hamilton, Lucas; Harrington, Michael; Lawrence, Cameron; Perrot, Remy; Studer, Severin – Information Systems Education Journal, 2017
This case examines the technological, ethical and legal issues surrounding the use of drones in business. Mary McKay, a recent Management Information Systems (MIS) graduate sets up a professional photography and videography business. She gains a leg up on the competition with drone-mounted cameras and live video streaming through the free…
Descriptors: Privacy, Legal Problems, Ethics, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Ministerial Council for Education, Early Childhood Development and Youth Affairs (NJ1), 2009
The process of collecting student background information from parents using nationally agreed definitions of student background characteristics began in 2005. The original edition of this manual, titled "Data Implementation Manual for Enrolments for the 2005 and 2006 School Years," was prepared to assist schools and systems in modifying…
Descriptors: Foreign Countries, Enrollment, Student Characteristics, Elementary School Students
Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2008
In 2008 the Council of Australian Government (COAG), which comprises the Prime Minister, State Premiers and Territory Chief Ministers, agreed to a new reform agenda to ensure that all Australian school students acquire the knowledge and skills to participate effectively in society and employment in a globalised economy. In order to advance its…
Descriptors: Foreign Countries, Enrollment, Student Characteristics, Elementary School Students
Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2007
This manual provides information to assist schools and school systems to collect student background information as required by Education Ministers. The purpose is to enable nationally comparable reporting of students' outcomes against the "National Goals for Schooling in the Twenty-First Century." It involves the collection of…
Descriptors: Foreign Countries, Enrollment, Student Characteristics, Elementary School Students
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime
Cheskis-Gold, Rena; Loescher, Ruth; Shepard-Rabadam, Elizabeth; Carroll, Barbara – Online Submission, 2004
This paper provides an overview of the entire process necessary to developing a university-wide web survey, from the community-building process for creating support for the survey and determining the questions, to the specific tasks necessary for designing and administering an efficient web product. (Contains 17 tables.)
Descriptors: Institutional Research, Higher Education, Surveys, Computer Assisted Testing
Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2006
This manual provides information to assist schools and school systems to collect student background information as required by Education Ministers. The purpose is to enable nationally comparable reporting of students' outcomes against the National Goals for Schooling in the Twenty-First Century. It involves the collection of information on…
Descriptors: Foreign Countries, Enrollment, Student Characteristics, Elementary School Students