NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 21 results Save | Export
Robert Babirad – Knowledge Quest, 2024
School librarians have a critical role to play in supporting the use of Ed Tech within our schools. It is an ever-changing field. Additionally, it is often the school librarian who has the unique responsibility of introducing and sharing new technology with their school community. However, school librarians also have the added responsibility of…
Descriptors: School Libraries, Librarians, Library Role, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ferguson, Daniel E.; Nichols, T. Philip – International Journal of Qualitative Studies in Education (QSE), 2021
In field-based research, masking practices, as well as the general practice of relegating historical context to abstracted 'site descriptions' in a paper's methodology section, can produce a tacit inattention to historical specificity. By juxtaposing two case studies of schools, this article examines the ways school sites are haunted by…
Descriptors: Privacy, Educational Research, History, Qualitative Research
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Renata Kochut; Thomas Brady – International Society for Technology, Education, and Science, 2024
This paper examines the Individualized Credit for Prior Learning (CPL) process in business education. It highlights its role in accrediting students' experiential learning and bridging practical experience with academic credit. This research then recommends solutions that include AI tools, advisor training, and centralized resource hubs. Most…
Descriptors: Business Education, Artificial Intelligence, Technology Uses in Education, Credits
Peer reviewed Peer reviewed
Direct linkDirect link
Murphy, Tonia Hap – Journal of Legal Studies Education, 2019
Business law and legal environment textbooks typically devote a page or two to the tort of invasion of privacy, describing the four versions of this tort, including "appropriation of identity." The Clarkson textbook notes that "An individual's right to privacy normally includes the right to the exclusive use of her or his…
Descriptors: Torts, Privacy, Publicity, Civil Rights
Peer reviewed Peer reviewed
Direct linkDirect link
Warnick, Bryan R.; Bitters, Todd A.; Falk, Thomas M.; Kim, Sang Hyun – Educational Policy, 2016
Teacher use of social networking sites such as Facebook has presented some ethical dilemmas for policy makers. In this article, we argue that schools are justified in taking action against teachers when evidence emerges from social networking sites that teachers are (a) doing something that is illegal, (b) doing something that reflects badly on…
Descriptors: Social Media, Mass Media Use, Ethics, Teacher Attitudes
Fox, Christine; Jones, Rachel – State Educational Technology Directors Association, 2018
This publication highlights how state policies and guidance are supporting the transformation to personalized learning through digital instructional materials. Specifically, the report includes personalized learning approaches and the policies and processes around the selection, curation, procurement, professional learning and funding of digital…
Descriptors: State Policy, Individualized Instruction, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal – Information Systems Education Journal, 2012
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
Descriptors: Social Networks, Privacy, Information Security, Student Attitudes
Mulholland, Jessica – Education Digest: Essential Readings Condensed for Quick Review, 2012
In New York's Port Washington Union Free School District, security and privacy for students, faculty, and staff coexist--thanks to security cameras with eyelids. In 2010, video cameras donated by New York-based SituCon Systems were installed in the main lobby at two of the district's seven schools. "We really haven't had the kind of incidents…
Descriptors: School Security, Video Technology, Photography, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Kregenow, Julia; Rogers, Michael; Constas, Mark – Astronomy Education Review, 2010
We discuss collecting data simultaneously from many different instruments, including both qualitative and quantitative sources. A list of instruments used is provided, and data collection methods are described. Many practical logistical concerns are discussed, warning of potential pitfalls to be avoided. This article is intended to be a practical…
Descriptors: Educational Research, Data Collection, Measures (Individuals), Statistical Analysis
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Giroux, Henry A. – Policy Futures in Education, 2009
For young people it just gets worse. Ten years after the Columbine tragedy, the debate over school safety has clearly shown that educators, parents, politicians, and the mainstream media have created the conditions in which young people have increasingly become the victims of adult mistreatment, indifference, neglect, even violence. The tragic…
Descriptors: School Safety, Violence, Young Adults, Youth
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lay, Mary M. – Quarterly Journal of Speech, 2003
Because "Roe v. Wade" left ill-defined or derivative just who could be a medical caregiver for pregnant women, courts struggled in the post-Roe medico-legal environment to decide just who could be a medical advisor in this newly recognized zone of privacy. The courts also were challenged to balance individual privacy rights, state…
Descriptors: Pregnancy, Obstetrics, Privacy, Court Litigation
Peer reviewed Peer reviewed
Newborg, Donald L. – Child Welfare, 1979
Provides information on recent decisions in New York courts in cases involving the right of adult adoptees to inspect sealed adoption records. The effect of these decisions is that any change in the right of access to records must be brought about through legislation, not through the courts. (Author/SS)
Descriptors: Adopted Children, Civil Liberties, Confidential Records, Constitutional Law
Coombs, Karen A. – Computers in Libraries, 2005
In this article, the author discusses how she and the other librarians at State University of New York (SUNY) Cortland learned to "scrub" their records so that patrons remained protected, but the librarians still had access to useful statistics. The topic of library privacy regulations is complex. There is a host of legislation at both…
Descriptors: Electronic Libraries, Librarians, Library Services, Privacy
Previous Page | Next Page ยป
Pages: 1  |  2