NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,071 to 2,085 of 3,392 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Warnick, Bryan R. – Harvard Educational Review, 2007
In this essay, Bryan R. Warnick responds to the increasing use of surveillance cameras in public schools by examining the ethical questions raised by their use. He explores the extent of a student's right to privacy in schools, stipulates how video surveillance is similar to and different from commonly accepted in-person surveillance practices,…
Descriptors: School Security, Ethics, Public Schools, Student Rights
Lipka, Sara – Chronicle of Higher Education, 2007
People connect on Facebook by asking to "friend" one another. A typical user lists at least 100 such connections, while newbies are informed, "You don't have any friends yet." A humbling statement. It might make one want to find some. But friending students can be even dicier than befriending them. In the real world, casual professors may ask…
Descriptors: Profiles, Ethics, College Faculty, Computer Mediated Communication
Albanese, Andrew; Bardales, Aida; Berry, John N., III; Datema, Jay; Fialkoff, Francine; Fox, Bette-Lee; Oder, Norman; Rogers, Michael; Williams, Wilda – Library Journal, 2007
This article presents the highlights of the 2007 American Library Association (ALA) annual conference held at the Washington Convention Center in Washington, D.C. Hundreds of librarians showed up early for a day of service, volunteering in libraries, schools, and other Washington-area institutions. As the conference wound down, some 2000…
Descriptors: Libraries, Library Associations, Librarians, Conferences (Gatherings)
Peer reviewed Peer reviewed
Direct linkDirect link
Staros, Kari; Williams, Charles F. – Social Education, 2007
The Fourth Amendment to the U.S. Constitution protects the people of the United States from unreasonable searches and seizures. On first reading, these protections seem clearly defined. The amendment was meant to protect Americans from the kinds of random searches and seizures that the colonists experienced under British colonial rule. Under…
Descriptors: Search and Seizure, Court Litigation, Constitutional Law, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Nackerud, Shane; Scaletta, Kurtis – New Directions for Student Services, 2008
Blogs are a hot topic in academia. A search on "blog" in the "Chronicle of Education's" Web site returns nearly two hundred articles, covering such topics as the dangers an impolitic blog can do to an institution's leaders (Read, 2006) or the blogger's career (Tribble, 2005) and the mutual use of blogs by instructors to lambaste students (Lipka,…
Descriptors: Higher Education, Web Sites, Electronic Publishing, College Libraries
Briggs, Linda L. – Campus Technology, 2008
As any instructor knows, the easy availability of internet content has greatly increased student opportunities for work that is less than original. Today, the term plagiarism can range in meaning from using an unattributed phrase or sentence (accidentally or intentionally) to submitting entire purchased works as one's own. The profusion of online…
Descriptors: Plagiarism, Internet, College Students, Writing Assignments
Peer reviewed Peer reviewed
Direct linkDirect link
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet
Anderson, Catherine L. – ProQuest LLC, 2010
Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. This dissertation seeks to improve extant understanding of how…
Descriptors: Cues, Health Education, Hospitals, Health Conditions
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Data Quality Campaign, 2010
The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…
Descriptors: Information Security, Stakeholders, Technical Assistance, Feedback (Response)
Peer reviewed Peer reviewed
Direct linkDirect link
Valentine, Sean; Kidwell, Roland E. – Quality Assurance in Education: An International Perspective, 2008
Purpose: This study aims to gauge business school student perceptions of the academic conduct of college professors, to determine students' ethical evaluations of certain potential faculty behaviors. The relationships between perceived faculty misconduct and several student demographic characteristics including sex and academic classification were…
Descriptors: Undergraduate Students, Teacher Effectiveness, Cheating, Familiarity
Peer reviewed Peer reviewed
Direct linkDirect link
Bullis, Ronald K. – American Journal of Sexuality Education, 2008
Two recent federal court cases have addressed the constitutionality of using sexual surveys in public schools. This article compares these cases with an earlier case dealing with the same issue but reaching different results. This article also describes the constitutional rights of parents to educate their children and the school's rights to…
Descriptors: Public Schools, Parent Rights, Court Litigation, Sex Education
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rubinstein-Ávila, Eliane – Journal of Language and Literacy Education, 2009
Whether a study is qualitative or quantitative, the process of data collection is not as orderly as it may seem when described in published research reports, articles, or books. Data collection may be more challenging when conducting research across national and linguistic borders. In this article, I share and reflect upon the complex and messy…
Descriptors: Educational Research, Research Problems, Research Opportunities, Data Collection
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Pages: 1  |  ...  |  135  |  136  |  137  |  138  |  139  |  140  |  141  |  142  |  143  |  ...  |  227