Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 17 |
Descriptor
Computer Uses in Education | 23 |
Crime | 23 |
Educational Technology | 14 |
Internet | 13 |
Foreign Countries | 11 |
Elementary Secondary Education | 10 |
Violence | 9 |
Higher Education | 8 |
Student Attitudes | 8 |
Academic Achievement | 7 |
Age Differences | 7 |
More ▼ |
Source
Author
Dillow, Sally A. | 6 |
Snyder, Thomas D. | 6 |
de Brey, Cristobal | 4 |
Leinbach, Carl | 2 |
Barron, Ann E. | 1 |
Brown, David S. | 1 |
D' Angelo, Jill M. | 1 |
Dobbs, Rhonda R. | 1 |
Dorling, Mark | 1 |
Frolick, Mark N. | 1 |
Hogarty, Kristine Y. | 1 |
More ▼ |
Publication Type
Journal Articles | 14 |
Reports - Research | 8 |
Numerical/Quantitative Data | 7 |
Reports - Descriptive | 7 |
Reports - Evaluative | 4 |
Collected Works - Serial | 2 |
Reference Materials - General | 2 |
Guides - Non-Classroom | 1 |
Education Level
Location
United Kingdom | 2 |
California | 1 |
Florida | 1 |
Germany | 1 |
Iraq | 1 |
United Kingdom (England) | 1 |
United Kingdom (London) | 1 |
United States | 1 |
Laws, Policies, & Programs
Individuals with Disabilities… | 6 |
No Child Left Behind Act 2001 | 2 |
Elementary and Secondary… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Dorling, Mark; Johnstone, Emm – Education in Science, 2012
The popularity of forensic science in schools continues to grow alongside the proportion of prime time scheduling devoted to CSI television shows. Yet the understanding of how forensic tests are used in narrowing down a field of possible suspects to the point where just one can be arrested or taken to trial is far less well understood. Students…
Descriptors: Computer Uses in Education, Databases, Educational Technology, Information Technology
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Leinbach, Carl – International Journal for Technology in Mathematics Education, 2011
This article will expand upon the techniques of Criminologist, D. Kim Rossmo, and Social Psychologist, David Canter for determining a serial criminal's base of operations. The basic framework for our investigation is that of Rossmo, but uses a different criterion for analysing the relationship of points within the hunting area defined by the crime…
Descriptors: Crime, School Security, Serial Ordering, Criminals
Leinbach, Patricia; Leinbach, Carl – International Journal for Technology in Mathematics Education, 2010
In this paper, we are proposing the use of forensic case studies as a means to provide students with interesting problem solving opportunities that capitalise on the popularity of several TV series and shows. It also satisfies their natural curiosity about how answers are found to seemingly complex real life problems. We begin with a very brief…
Descriptors: Student Interests, Crime, Case Studies, Educational Technology
Dobbs, Rhonda R.; Waid, Courtney A.; del Carmen, Alejandro – Quarterly Review of Distance Education, 2009
While online learning is nothing new, research regarding student perceptions of online courses is limited and has generally focused on those who have taken online courses. Data were collected from 180 students taking criminal justice courses on campus at a large 4-year university in the Southwest and 100 students taking criminal justice courses in…
Descriptors: Electronic Learning, Student Attitudes, Online Courses, Attitude Measures
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Kass, David H.; LaRoe, Robert – Biochemistry and Molecular Biology Education, 2007
A simple, rapid method for generating complex genetic profiles using Alu-based markers was recently developed for students primarily at the undergraduate level to learn more about forensics and paternity analysis. On the basis of the Cold Spring Harbor Allele Server, which provides an excellent tool for analyzing a single Alu variant, we present a…
Descriptors: Persuasive Discourse, Genetics, Profiles, Internet
de Brey, Cristobal; Snyder, Thomas D.; Zhang, Anlan; Dillow, Sally A. – National Center for Education Statistics, 2021
The 2019 edition of the "Digest of Education Statistics" is the 55th in a series of publications initiated in 1962. The purpose of the "Digest" is to provide a compilation of statistical information covering the broad field of American education from prekindergarten through graduate school. It contains data on a variety of…
Descriptors: Elementary Secondary Education, Postsecondary Education, Federal Aid, Educational Finance
Wefer, Stephen H.; Sheppard, Keith – CBE - Life Sciences Education, 2008
The proliferation of bioinformatics in modern biology marks a modern revolution in science that promises to influence science education at all levels. This study analyzed secondary school science standards of 49 U.S. states (Iowa has no science framework) and the District of Columbia for content related to bioinformatics. The bioinformatics…
Descriptors: Computer Uses in Education, Science and Society, Biology, Scientific Literacy
D' Angelo, Jill M.; Woosley, Sherry Ann – Education, 2007
This study explores students' perceptions of the value that technology brings to the classroom. A survey administered to undergraduate students enrolled in criminal justice courses showed that the majority of students have been taught with PowerPoint and/or blackboard. The findings further suggest that students maintain the perception that modern…
Descriptors: Undergraduate Students, Student Attitudes, Educational Technology, Teaching Methods

Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Rudd, Peter; Reed, Frances; Smith, Paula – National Foundation for Educational Research, 2008
This document summarizes research to demonstrate the difference that Building Schools for the Future (BSF) schools are making to young people's attitudes towards education and learning, as measured by their levels of engagement and enthusiasm for school. The key research objective was further broken down into a number of research questions: (1)…
Descriptors: Student Attitudes, Self Efficacy, School Buildings, Educational Environment
Snyder, Thomas D.; de Brey, Cristobal; Dillow, Sally A. – National Center for Education Statistics, 2019
The 2017 edition of the "Digest of Education Statistics" is the 53rd in a series of publications initiated in 1962. The "Digest" has been issued annually except for combined editions for the years 1977-78, 1983-84, and 1985-86. Its primary purpose is to provide a compilation of statistical information covering the broad field…
Descriptors: Elementary Secondary Education, Postsecondary Education, Federal Aid, Educational Finance
Snyder, Thomas D.; de Brey, Cristobal; Dillow, Sally A. – National Center for Education Statistics, 2019
The 54th in a series of publications initiated in 1962, the purpose of the "Digest" is to provide a compilation of statistical information covering the broad field of education from prekindergarten through graduate school. It contains data on a variety of topics, including the number of schools and colleges, teachers, enrollments, and…
Descriptors: Elementary Secondary Education, Postsecondary Education, Federal Aid, Educational Finance

Barron, Ann E.; Hogarty, Kristine Y.; Kromery, Jeffrey D.; Lenkway, Peter – Journal of Research on Computing in Education, 1999
Examines the relationship between computer use (numbers of computers used for instruction) in Florida schools and student conduct, focusing on these conduct violations related to schooling: assault/battery/robbery, breaking and entry/theft/vandalism, and disorderly conduct/fighting/harassment. Results revealed decreases in conduct violations with…
Descriptors: Computer Uses in Education, Crime, Educational Technology, Elementary Secondary Education
Previous Page | Next Page ยป
Pages: 1 | 2