NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,621 to 1,635 of 3,392 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Perrotta, Carlo – Learning, Media and Technology, 2013
This paper contends that powerful techniques to manipulate data, enabled by technological and economic developments, can be easily co-opted to serve the restrictive frameworks of hyper-controlling, managerial accountability that characterise current cultures of summative assessment in education. In response to these challenges, research is…
Descriptors: Literacy, Research Needs, Barriers, Performance Factors
D'Angelo, Angela Valdovinos; Rich, Lauren; Kwiatt, Jaclyn – Chapin Hall at the University of Chicago, 2013
A commonly held belief is that children whose families are struggling with poverty--and the housing, health, safety, and other concerns that often go with it--cannot focus on learning unless their nonacademic needs are met. This belief is supported by research showing that the children of poor parents who receive income supplements and other…
Descriptors: Family Programs, Financial Support, Integrated Services, Low Income Groups
Peer reviewed Peer reviewed
Direct linkDirect link
Hanley, Christopher – Management in Education, 2013
This article reviews some leadership and management literature dealing with emotional demands in professional contexts. An image of the "real self", requiring emotional privacy, is highly valued by individuals subjected to intense emotional demands. It is argued that the "real self" and emotional privacy ought to be defended…
Descriptors: Privacy, Self Concept, High Achievement, Educational Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Salmon, Gilly; Ross, Bella; Pechenkina, Ekaterina; Chase, Anne-Marie – Research in Learning Technology, 2015
In this paper, we explore the benefits of using social media in an online educational setting, with a particular focus on the use of Facebook and Twitter by participants in a Massive Open Online Course (MOOC) developed to enable educators to learn about the Carpe Diem learning design process. We define social media as digital social tools and…
Descriptors: Social Media, Electronic Learning, Online Courses, Large Group Instruction
Dow, Mirah J.; Boettcher, Carrie A.; Diego, Juana F.; Karch, Marziah E.; Todd-Diaz, Ashley; Woods, Kristine M. – Journal of Education for Library and Information Science, 2015
The purpose of this mixed methods study is to determine the effectiveness of case-based pedagogy in teaching basic principles of information ethics and ethical decision making. Study reports results of pre- and post-assessment completed by 49 library and information science (LIS) graduate students at a Midwestern university. Using Creswell's…
Descriptors: Case Method (Teaching Technique), Mixed Methods Research, Instructional Effectiveness, Ethics
Wiggins, Afi Y.; Stelling, Laura – Online Submission, 2015
This supplemental report provides technical documentation for the full report (published separately) concerning the 63% of AISD's Class of 2013 graduates who enrolled in a postsecondary institution the year after high school, and 74% of Class of 2012 graduates persisted in college for a second year. [For the full report, see ED626498.]
Descriptors: Postsecondary Education, College Attendance, Enrollment Trends, High School Graduates
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woodward, Belle; Martin, Nancy; Imboden, Thomas – Information Systems Education Journal, 2011
In recent years, ethics has drawn increased interest from information technology and computer science practitioners as well as from academicians. This article investigates the issues outlined in the PAPA framework in today's environment and explores the possibility that new issues have emerged. Findings indicate that the ethicality of property…
Descriptors: Ethics, Models, Information Technology, Student Surveys
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Ahluwalia, Madhu V. – ProQuest LLC, 2011
In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…
Descriptors: Databases, Information Security, Data, Information Retrieval
Adams, Helen R. – School Library Journal, 2011
Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…
Descriptors: Privacy, Student Rights, Student Records, School Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie – Learning and Instruction, 2011
The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…
Descriptors: Voting, Debate, Classroom Environment, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Austin, Lisa M. – Bulletin of Science, Technology & Society, 2010
Contemporary privacy debates regarding new technologies often define privacy in terms of control over personal information such that the privacy "problem" is a lack of control and the privacy "solution" is increased control. This article questions the control-paradigm by pointing to its parallels with earlier debates in the…
Descriptors: Information Technology, Privacy, Legal Responsibility, Social Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal – Information Systems Education Journal, 2012
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
Descriptors: Social Networks, Privacy, Information Security, Student Attitudes
Rogers, Sheryl D. – ProQuest LLC, 2012
The study was a policy analysis of student records policies within Florida public K-12 school districts. The researcher gathered all student records policies for the sixty-seven school districts. In addition, traditional legal research was used involving applicable federal acts, state statutes, case law, as well as legal and educational…
Descriptors: Public Schools, School Policy, Privacy, Policy Analysis
Greer, Christine Glah – ProQuest LLC, 2012
This study focuses on the response of universities to the permissive disclosure clauses of the Family Educational Rights and Privacy Act (FERPA). FERPA has been amended nine times; some of these amendments permit universities to disclose personally identifiable information without the permission of students. The purpose of this study is to…
Descriptors: Student Records, Privacy, Student Rights, Disclosure
Pages: 1  |  ...  |  105  |  106  |  107  |  108  |  109  |  110  |  111  |  112  |  113  |  ...  |  227