NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,071 to 2,085 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Tracy – CUPA-HR Journal, 2003
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Descriptors: Human Resources, Colleges, Computer Security, Privacy
Read, Brock – Chronicle of Higher Education, 2006
Students in the US are increasingly discovering that online socializing is far from private and that sharing personal details on social-networking Web sites, such as Facebook, can have unintended consequences. A growing number of colleges are moving to disabuse students of the notion that the Internet is their private playground and what they type…
Descriptors: Internet, Web Sites, Social Networks, Privacy
Palestini, Robert; Falk, Karen Palestini – Rowman & Littlefield Education, 2012
This third edition expands coverage on such topics as the law and students with disabilities, confidentiality, sexual harassment, student searches and tuition vouchers. It also includes some new topics such as bullying, copyright law, and the law and the internet. Both public and nonpublic school educators are aware that courts, over the last…
Descriptors: School Law, Court Litigation, Public Schools, Private Schools
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Warnick, Bryan R. – Harvard Educational Review, 2007
In this essay, Bryan R. Warnick responds to the increasing use of surveillance cameras in public schools by examining the ethical questions raised by their use. He explores the extent of a student's right to privacy in schools, stipulates how video surveillance is similar to and different from commonly accepted in-person surveillance practices,…
Descriptors: School Security, Ethics, Public Schools, Student Rights
Lipka, Sara – Chronicle of Higher Education, 2007
People connect on Facebook by asking to "friend" one another. A typical user lists at least 100 such connections, while newbies are informed, "You don't have any friends yet." A humbling statement. It might make one want to find some. But friending students can be even dicier than befriending them. In the real world, casual professors may ask…
Descriptors: Profiles, Ethics, College Faculty, Computer Mediated Communication
Albanese, Andrew; Bardales, Aida; Berry, John N., III; Datema, Jay; Fialkoff, Francine; Fox, Bette-Lee; Oder, Norman; Rogers, Michael; Williams, Wilda – Library Journal, 2007
This article presents the highlights of the 2007 American Library Association (ALA) annual conference held at the Washington Convention Center in Washington, D.C. Hundreds of librarians showed up early for a day of service, volunteering in libraries, schools, and other Washington-area institutions. As the conference wound down, some 2000…
Descriptors: Libraries, Library Associations, Librarians, Conferences (Gatherings)
Peer reviewed Peer reviewed
Direct linkDirect link
Staros, Kari; Williams, Charles F. – Social Education, 2007
The Fourth Amendment to the U.S. Constitution protects the people of the United States from unreasonable searches and seizures. On first reading, these protections seem clearly defined. The amendment was meant to protect Americans from the kinds of random searches and seizures that the colonists experienced under British colonial rule. Under…
Descriptors: Search and Seizure, Court Litigation, Constitutional Law, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Nackerud, Shane; Scaletta, Kurtis – New Directions for Student Services, 2008
Blogs are a hot topic in academia. A search on "blog" in the "Chronicle of Education's" Web site returns nearly two hundred articles, covering such topics as the dangers an impolitic blog can do to an institution's leaders (Read, 2006) or the blogger's career (Tribble, 2005) and the mutual use of blogs by instructors to lambaste students (Lipka,…
Descriptors: Higher Education, Web Sites, Electronic Publishing, College Libraries
Briggs, Linda L. – Campus Technology, 2008
As any instructor knows, the easy availability of internet content has greatly increased student opportunities for work that is less than original. Today, the term plagiarism can range in meaning from using an unattributed phrase or sentence (accidentally or intentionally) to submitting entire purchased works as one's own. The profusion of online…
Descriptors: Plagiarism, Internet, College Students, Writing Assignments
Peer reviewed Peer reviewed
Direct linkDirect link
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet
Anderson, Catherine L. – ProQuest LLC, 2010
Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. This dissertation seeks to improve extant understanding of how…
Descriptors: Cues, Health Education, Hospitals, Health Conditions
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Data Quality Campaign, 2010
The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…
Descriptors: Information Security, Stakeholders, Technical Assistance, Feedback (Response)
Peer reviewed Peer reviewed
Direct linkDirect link
Valentine, Sean; Kidwell, Roland E. – Quality Assurance in Education: An International Perspective, 2008
Purpose: This study aims to gauge business school student perceptions of the academic conduct of college professors, to determine students' ethical evaluations of certain potential faculty behaviors. The relationships between perceived faculty misconduct and several student demographic characteristics including sex and academic classification were…
Descriptors: Undergraduate Students, Teacher Effectiveness, Cheating, Familiarity
Pages: 1  |  ...  |  135  |  136  |  137  |  138  |  139  |  140  |  141  |  142  |  143  |  ...  |  227