NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)2
Since 2006 (last 20 years)19
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 27 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Bruton, Samuel; Childers, Dan – Assessment & Evaluation in Higher Education, 2016
Recently, the usage of plagiarism detection software such as Turnitin® has increased dramatically among university instructors. At the same time, academic criticism of this software's employment has also increased. We interviewed 23 faculty members from various departments at a medium-sized, public university in the southeastern US to determine…
Descriptors: Plagiarism, College Faculty, Teacher Attitudes, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Kert, Serhat Bahadir; Uz, Cigdem; Gecu, Zeynep – Educational Technology & Society, 2014
This study examined the effectiveness of an electronic performance support system (EPSS) on computer ethics education and the ethical decision-making processes. There were five different phases to this ten month study: (1) Writing computer ethics scenarios, (2) Designing a decision-making framework (3) Developing EPSS software (4) Using EPSS in a…
Descriptors: Ethical Instruction, Decision Making, Ethics, Computer Uses in Education
Association Supporting Computer Users in Education, 2017
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Computer Software, Conferences (Gatherings)
Peer reviewed Peer reviewed
Direct linkDirect link
Probett, Christine – Business Communication Quarterly, 2011
Plagiarism does exist at universities today. In some cases, students are naive with respect to understanding what plagiarism is and how to avoid it. In other cases, students blatantly disregard and disrespect the written work of others, claiming it as their own. Regardless, educators must be vigilant in their efforts to discourage and prevent…
Descriptors: Plagiarism, Cheating, Ethics, Student Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
den Ouden, Hanny; van Wijk, Carel – Business Communication Quarterly, 2011
Students write papers in many of their courses to improve their writing skills and to foster an active attitude toward learning. Every year, they hand in hundreds of papers for teachers to assess. This stream may get polluted in two ways: by simple copying from Internet sources and by the exchange of text fragments between students. These…
Descriptors: Foreign Countries, College Students, Plagiarism, Cheating
Peer reviewed Peer reviewed
Direct linkDirect link
Duncan, Sarah I.; Bishop, Pamela; Lenhart, Suzanne – CBE - Life Sciences Education, 2010
We describe a unique Research Experience for Undergraduates and Research Experience for Veterinary students summer program at the National Institute for Mathematical and Biological Synthesis on the campus of the University of Tennessee, Knoxville. The program focused on interdisciplinary research at the interface of biology and mathematics.…
Descriptors: Veterinary Medical Education, Mentors, Summer Programs, Biology
Peer reviewed Peer reviewed
Direct linkDirect link
Ma, Hongyan; Wan, Guofang; Lu, Eric Yong – Theory Into Practice, 2008
Cheating is not a new phenomenon, yet the ways that students cheat and their attitudes toward cheating have changed. The Internet age has brought tremendous opportunities for students and teachers in teaching and learning, and yet it has also brought challenges to academic integrity. This article discusses various reasons why young people cheat…
Descriptors: Plagiarism, Cheating, Integrity, Internet
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Badge, Joanne L.; Cann, Alan J.; Scott, Jon – Assessment & Evaluation in Higher Education, 2007
In the UK, there is great concern about the perceived increase in plagiarized work being submitted by students in higher educations. Although there is much debate, the reasons for the perceived change are not completely clear. Here we present the results of a 2-year trial of the JISC Plagiarism Detection Service (PDS) involving hundreds of…
Descriptors: Plagiarism, Biological Sciences, Cheating, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Vaccaro, Nicole; Lambie, Glenn W. – Counselor Education and Supervision, 2007
Computer-based clinical supervision of counselors-in-training is becoming more prevalent (M. Reisch & L. Jarman-Rohde, 2000); however, its use is still in its infancy, and ethical standards have not been established regarding its practice. There exists a dearth of literature focusing on the ethical practice and development of supervisees when…
Descriptors: Supervision, Counselors, Ethics, Counselor Training
King, Kenneth M. – EDUCOM Bulletin, 1988
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
Descriptors: Computer Networks, Computer Software, Computer Uses in Education, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Hepburn, Gary; Buley, Jan – Innovate: Journal of Online Education, 2006
In this article Gary Hepburn and Jan Buley outline different approaches to implementing open source software (OSS) in schools; they also address the challenges that open source advocates should anticipate as they try to convince educational leaders to adopt OSS. With regard to OSS implementation, they note that schools have a flexible range of…
Descriptors: Computer Software, Principals, Barriers, Ethics
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Carol – Journal of Social Work Education, 2008
Many types of technology support caregiving: (1) Assistive devices include medicine dispensers, feeding and bathing machines, clothing with polypropylene fibers that stimulate muscles, intelligent ambulatory walkers for those with both vision and mobility impairment, medication reminders, and safety alarms; (2) Telecare devices ranging from…
Descriptors: Disabilities, Assistive Technology, Caregivers, Accessibility (for Disabled)
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail
Previous Page | Next Page »
Pages: 1  |  2