NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 28 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Chisholm, Alexandria; Hartman-Caverly, Sarah – portal: Libraries and the Academy, 2022
Personal technology use can significantly impact wellness. The transition to widespread remote learning, working, and socializing during the COVID-19 pandemic exacerbated society's reliance on technology. This article presents a case study of how the authors applied their privacy scholarship to offer a responsive learning experience for students…
Descriptors: COVID-19, Pandemics, Wellness, Influence of Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hartman-Caverly, Sarah; Chisholm, Alexandria; Glenn, Alexandrea – College & Research Libraries, 2023
This qualitative, evaluative case study details the conceptual framing, development, delivery, and assessment of a privacy literacy workshop called Digital Shred. The workshop is a multi-institutional effort offered initially in-person in fall 2019 and adapted to virtual delivery in fall 2020. The conceptual framework underlying the workshop…
Descriptors: Privacy, Workshops, Academic Libraries, Digital Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Casey Gogno; Scott Burden; Wyntre Stout – Association for Institutional Research, 2024
Creating a welcoming community is key for an academic environment to thrive. This approach includes accurately representing community members' identities to understand their experiences, and establishing procedures for recording and utilizing individuals' names to support their ability to express their identities freely and without fear of…
Descriptors: Data Collection, Information Storage, Student Characteristics, Identification
Kamara, Kesselly Sheick – ProQuest LLC, 2019
The problem addressed by this study is the strategies analysts need in higher education institutions to improve the protection of personally identifiable and sensitive data. The qualitative exploratory design was used to examine the strategies used by nine analysts. The combined experience of the nine analysts in data analytics, cyber security,…
Descriptors: Higher Education, Information Security, Privacy, Ownership
Peer reviewed Peer reviewed
Direct linkDirect link
Raible, Claire A.; Dick, Rebecca; Gilkerson, Fern; Mattern, Cheryl S.; James, Lisa; Miller, Elizabeth – Journal of School Health, 2017
Background: Project Connect is a national program to build partnerships among public health agencies and domestic violence services to improve the health care sector response to partner and sexual violence. Pennsylvania piloted the first school nurse-delivered adolescent relationship abuse intervention in the certified school nurses' office…
Descriptors: School Nurses, Prevention, Intervention, Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Warnick, Bryan R.; Bitters, Todd A.; Falk, Thomas M.; Kim, Sang Hyun – Educational Policy, 2016
Teacher use of social networking sites such as Facebook has presented some ethical dilemmas for policy makers. In this article, we argue that schools are justified in taking action against teachers when evidence emerges from social networking sites that teachers are (a) doing something that is illegal, (b) doing something that reflects badly on…
Descriptors: Social Media, Mass Media Use, Ethics, Teacher Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Eckes, Suzanne E. – Journal of LGBT Youth, 2017
As society's views of sexual orientation and gender identity have significantly evolved in recent years, school districts across the country are addressing how to create policies that align with the law in this area. One recent issue involves laws and policies focused on transgender students and their right to access restrooms that align with…
Descriptors: Sexual Orientation, Sexual Identity, School Districts, School Policy
Fox, Christine; Jones, Rachel – State Educational Technology Directors Association, 2018
This publication highlights how state policies and guidance are supporting the transformation to personalized learning through digital instructional materials. Specifically, the report includes personalized learning approaches and the policies and processes around the selection, curation, procurement, professional learning and funding of digital…
Descriptors: State Policy, Individualized Instruction, Educational Technology, Technology Uses in Education
Zimmerman, Melisa S. – ProQuest LLC, 2014
The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…
Descriptors: Social Networks, Crime, College Students, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Hipsky, Shellie; Younes, Wiam – International Journal of Information and Communication Technology Education, 2015
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Descriptors: Elementary School Teachers, Secondary School Teachers, Teacher Attitudes, Privacy
Harlan, Jennifer – ProQuest LLC, 2013
Knowledge management has proven to be a sustainable competitive advantage for many organizations. Knowledge management systems are abundant, with multiple functionalities. The literature reinforces the use of workflow automation with knowledge management systems to benefit organizations; however, it was not known if process automation yielded…
Descriptors: Automation, Case Studies, Knowledge Management, Computer Software
Data Quality Campaign, 2016
Every state can create secure, robust linkages between early childhood and K-12 data systems, and effectively use the information from these linkages to implement initiatives to support programs and children, answer key policy questions, and be transparent about how the state's early childhood investments prepare students for success in school and…
Descriptors: Early Childhood Education, Elementary School Curriculum, Data, Program Implementation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Vukotich, Charles J., Jr.; Cousins, Jennifer; Stebbins, Samuel – Journal of Research Practice, 2014
Engaged scholarship, translational science, integrated research, and interventionist research, all involve bringing research into a practical context. These usually require working with communities and institutions, and often involve community based participatory research. The article offers practical guidance for engaged research. The authors…
Descriptors: Cooperation, Teamwork, Research Methodology, Research
Peer reviewed Peer reviewed
Direct linkDirect link
Stormont, Sam – Public Services Quarterly, 2010
The creation of an instant messaging (IM) service is described. The challenges encountered in developing, launching, and maintaining the project are examined and include technical support, archiving, balancing different formats, privacy, assessment, training, and the effectiveness of the IM channel. The process of choosing an aggregator and a…
Descriptors: Reference Services, Computer Mediated Communication, Technical Support, Privacy
Previous Page | Next Page ยป
Pages: 1  |  2