Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 25 |
Descriptor
Computer Mediated… | 34 |
Legal Responsibility | 34 |
Internet | 15 |
Bullying | 9 |
Social Networks | 9 |
Educational Technology | 8 |
Ethics | 8 |
Web Sites | 7 |
Computer Uses in Education | 6 |
Court Litigation | 6 |
Compliance (Legal) | 5 |
More ▼ |
Source
Author
Kirby, Elizabeth | 2 |
Salomon, Kenneth D. | 2 |
Balch, Bradley V. | 1 |
Belch, Harry Ess | 1 |
Boucek, Sara G. | 1 |
Brown, Abbie | 1 |
Brown, David S. | 1 |
Crespi, Tony D. | 1 |
Davies, Mark R. | 1 |
Davis, Michelle R. | 1 |
Geer, Cynthia | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 34 |
Journal Articles | 28 |
Opinion Papers | 3 |
Collected Works - Serial | 2 |
Guides - Classroom - Teacher | 2 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 4 |
Elementary Secondary Education | 3 |
High Schools | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Administrators | 4 |
Teachers | 3 |
Media Staff | 1 |
Practitioners | 1 |
Laws, Policies, & Programs
First Amendment | 3 |
Education Amendments 1972 | 2 |
Title IX Education Amendments… | 2 |
Civil Rights Act 1964 | 1 |
Telecommunications Act 1996 | 1 |
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
Gerwig-Parker, Lorri A.; Tromski-Klingshirn, Donna; Kolssak, Rebecca; Miller, Joshua D. – Leadership and Research in Education, 2020
In 2019, 36.5% of students, age 12-17, reported that they were cyberbullied at some point in their life. Cyberbullying is a growing problem within Ohio. Self-mutilation, attempted suicide, and death have been linked to victims of cyberbullying. Within Ohio, there are also legal implications for schools to consider. Using Bronfenbrenner's…
Descriptors: Bullying, Computer Mediated Communication, Victims, State Legislation
Paechter, Carrie – E-Learning and Digital Media, 2012
This article is about the informal learning that took place in an online divorce support and advice forum. In it, the author discusses the formation of a community of practice among the members during the first nine months of the site's operation. The author shows how the key markers of mutual engagement, joint enterprise and shared repertoire…
Descriptors: Computer Mediated Communication, Coping, Divorce, Communities of Practice
Henderson, Michael; de Zwart, Melissa – Australian Educational Computing, 2014
This article represents the submission of the "Australian Council for Computers in Education's" (AACE) response to the Australian Government's Department of Communications' initiative for "Enhancing Online Safety for Children." Henderson and de Zwart agree that children and their educators and caregivers are in serious need…
Descriptors: Foreign Countries, Computer Mediated Communication, Social Networks, Child Safety
Schaffhauser, Dian – Campus Technology, 2012
Putting a CIO and a lawyer together in the same room may give one the start of a pretty decent joke, but it could also save an institution millions of dollars in legal fees. While the IT chief understands the systems that fall under the purview of compliance, the attorney is the go-to pessimist for identifying the "gotcha" elements when it comes…
Descriptors: Legal Problems, Compliance (Legal), Legal Responsibility, Information Technology
Belch, Harry Ess – Learning & Leading with Technology, 2012
Think teachers can post what they want on their own time? Think again. Many have lost their jobs over social networking gaffes in recent years. In this article, the author shares what he has learned about how school districts cope with teachers and online social networking sites, and offers recommendations to teachers who want to have an online…
Descriptors: Social Life, Social Networks, Teacher Behavior, Mass Media Effects
Davis, Michelle R. – Education Week, 2012
Two teenage girls were arrested in Florida and charged with cyberstalking after creating a fake Facebook page impersonating another student and using it to bully her. Students at an Indianapolis high school set up false Twitter accounts for their principal and tweeted offensive comments before the account was shut down. And at a Minnesota middle…
Descriptors: Bullying, School Safety, Profiles, Peer Relationship
Roberts-Pittman, Bridget; Slavens, Julie; Balch, Bradley V. – School Administrator, 2012
Bullying is not simply the same act of misbehavior taking place electronically. While the two phenomena share common characteristics (use of power, harmful intent), distinct and important differences exist. The first is the concept of power. Power in cyberspace is not measured by physical size or family income. Instead, power lies in the anonymity…
Descriptors: Prevention, Intervention, Bullying, Discipline
Segool, Natasha K.; Crespi, Tony D. – Communique, 2011
Rapid advances in digital technologies have resulted in school professionals having to grapple with new and complex dilemmas related to balancing student privacy, safety, and legal rights and restrictions, often with little to no guidance from school or district policies. Students commonly bring cellular telephones, smartphones, iPods, and other…
Descriptors: School Psychologists, Privacy, Telecommunications, Computer Mediated Communication
Hinduja, Sameer; Patchin, Justin W. – Preventing School Failure, 2011
School districts are often given the challenging task of addressing problematic online behaviors committed by students while simultaneously protecting themselves from civil liability by not overstepping their authority. This is difficult, because the law concerning these behaviors is ambiguous and continuously evolving, and little consensus has…
Descriptors: Legal Problems, Civil Rights, Court Litigation, Bullying
American Federation of Teachers (NJ), 2010
Modern technology and the Internet have opened the door to a plethora of new opportunities to learn. It is now easier to research, communicate and study, thanks to advances in technology. There are, however, problems and dangers associated with new technology. Teachers need to remain up to date on these advances. The widespread popularity of…
Descriptors: Internet, Educational Technology, Computer Uses in Education, Teaching Methods
Genova, Gina L. – Business Communication Quarterly, 2009
Employers have legitimate business interests in monitoring workplace Internet use: to minimize legal exposure, to increase productivity, and to avoid proprietary information loss. Since employees arguably have no expectation of privacy in their work on employers' computers, there are few grounds for complaint if they are disciplined for straying…
Descriptors: Employees, Electronic Mail, Expectation, Privacy
Lee, Konrad S.; Thue, Matthew I.; Oldham, Jared; Stephenson, Tara N. – Journal of Legal Studies Education, 2009
This article provides a tool to help instructors introduce students to the intersection of blogging and employment law. Section II provides source materials on the subject. Specifically, it presents a summary overview of: (1) the development of blogging and other forms of online user generated content; (2) the legality of terminating an at-will…
Descriptors: Web Sites, Electronic Publishing, Internet, Employment
Roberts, Sherry J.; Roach, Terry – Business Communication Quarterly, 2009
Social Networking Web sites (SNWs) are now being used as reference checks by human resource personnel. For this reason, SNW users, particularly university students and other soon-to-be job applicants, should ask the following questions: Am I loading information that I want the world to see? Is this really a picture that shows me in the best light?…
Descriptors: Job Applicants, Personnel Selection, Human Resources, Social Networks
Rampell, Catherine – Chronicle of Higher Education, 2008
This article reports on the withdrawal of some universities' support of a music industry's campaign against music piracy on their campuses. Talk to the chief information officer at just about any American university, and he will probably say that his institution has bent over backward to help the Recording Industry Association of America curb…
Descriptors: Higher Education, Music, Lobbying, Industry
Hartung, Susan – Techniques: Connecting Education and Careers (J3), 2008
Determining whether student speech occurred on or off campus can be difficult and requires evaluation of a multitude of factors, including whether the speech occurred during school hours or on school property, whether it occurred at a school-sponsored event, whether school resources were used in its creation or distribution, and the impact of the…
Descriptors: Court Litigation, School Policy, Freedom of Speech, Computer Mediated Communication