NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,131 to 2,145 of 3,392 results Save | Export
Peer reviewed Peer reviewed
Volkwein, Karin A. E.; Sankaran, Gopal; Bonsall, Dale R. – Quest, 1999
Examines issues regarding rights, obligations, risks, privacy, and policy related to HIV/AIDS in sports, discussing the growing dilemma for sports professionals to weigh an athlete's right to privacy against their own duty to warn in the decision-making process; describing mandatory HIV testing for athletes; and providing guidelines based on…
Descriptors: Acquired Immune Deficiency Syndrome, Athletes, Athletics, Ethics
Peer reviewed Peer reviewed
Pittman, Joyce; McLaughlin, Brian – Educational Leadership, 2000
Despite the 1998 Children's Online Privacy Act's supposed protections, most web sites still collect personal information and post no privacy statements. Internet-filtering software packages are described and suggestions given for creating a safe environment, dismantling "cookies," informing parents and teachers, and checking…
Descriptors: Elementary Education, Federal Legislation, Internet, Legal Problems
Peer reviewed Peer reviewed
Pershing, James A.; Pershing, Jana L. – Human Resource Development Quarterly, 2001
Question dimensions, construction, and response formats of 50 reactionnaire forms completed by participants in medical school programs were analyzed. Numerous problems in 30 forms and shortcomings in 20 others were identified. Ways to improve layout, appearance, anonymity protection, and questions were suggested. (Contains 53 references.) (SK)
Descriptors: Attitude Measures, Evaluation Problems, Privacy, Surveys
Peer reviewed Peer reviewed
English, Leona M. – New Directions for Adult and Continuing Education, 2001
Ethical issues involved in using journals in education include balancing the personal and professional and assessing journal writing. Principles adult educators can apply include respect, justice, beneficence, self-awareness, and caring. (Contains 26 references.) (SK)
Descriptors: Adult Education, Educational Principles, Ethics, Journal Writing
Peer reviewed Peer reviewed
Robinson, Robert K.; And Others – Journal of Education for Business, 1996
Discusses potential liability concerns for public and private colleges and universities regarding public disclosure of faculty teaching evaluations. Guidelines for dealing with these records are given. (SK)
Descriptors: Confidential Records, Disclosure, Higher Education, Legal Responsibility
Flanigan, Robin L. – American School Board Journal, 2000
Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)
Descriptors: Electronic Equipment, Privacy, School Security, Secondary Education
Peer reviewed Peer reviewed
Bernstein, Alan – T.H.E. Journal, 1998
Describes an electronic mail project that was designed to create an electronic mailing list of parents so the high school's administrators could communicate with parents on a regular basis and keep them informed of school-related news. Issues of privacy and confidentiality are discussed, and Web sites are considered. (LRW)
Descriptors: Administrators, Confidentiality, Electronic Mail, High Schools
Van Horn, Royal – Phi Delta Kappan, 2004
The Internet was designed as an open system that promoted the two-way flow of information. In other words, everything that is sent has a return address called an IP or Internet Protocol address of the form: 000.11.222.33. Whenever you connect to a website, the site learns your IP address. It also learns the type of computer you are using, the…
Descriptors: Web Sites, Social Networks, Internet, Privacy
Viadero, Debra – Education Week, 2006
Researchers looking to tap into the treasure troves of long-term student-achievement data that states and districts are starting to pile up say their efforts are increasingly running up against a decades-old federal law designed to protect student privacy. "More and more people are starting to look into questions of the federal…
Descriptors: Educational Researchers, Educational Research, Academic Achievement, Federal Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it…
Descriptors: School Nurses, Confidentiality, Risk, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Steinfeld, Lauren; Archuleta, Kathleen Sutherland – EDUCAUSE Review, 2006
Privacy--and the loss of it--attracts attention. Few issues enjoy a higher national profile. In the growing list of data breaches reported over the last year, the leading industry sector has been higher education. Colleges and universities now find themselves in the spotlight as they grapple with an increasingly complex legal and regulatory…
Descriptors: Higher Education, Privacy, School Security, Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Cate, Fred H. – EDUCAUSE Review, 2006
Colleges and universities face heightened responsibilities. They possess a large volume and variety of sensitive information on a wide range of individuals, and demands for this information are growing. The students that are educated, housed, and/or employed by colleges and universities tend to be in a vulnerable age cohort: eighteen- to…
Descriptors: Young Adults, Privacy, Vocational Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Dence, Thomas P.; Heath, Steven – Mathematics and Computer Education, 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how…
Descriptors: Technology, Probability, Number Concepts, Mathematical Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Essex, Nathan L. – Education and the Law, 2005
The Fourth Amendment to the US Constitution provides protection of all citizens against unreasonable search and seizure. The US Supreme Court has affirmed that the basic purpose of the Fourth Amendment is to safeguard the privacy and security of individuals against unreasonable intrusive searches by governmental officials. Since students possess…
Descriptors: Student Rights, Privacy, Public Schools, Search and Seizure
Ministerial Council for Education, Early Childhood Development and Youth Affairs (NJ1), 2009
The process of collecting student background information from parents using nationally agreed definitions of student background characteristics began in 2005. The original edition of this manual, titled "Data Implementation Manual for Enrolments for the 2005 and 2006 School Years," was prepared to assist schools and systems in modifying…
Descriptors: Foreign Countries, Enrollment, Student Characteristics, Elementary School Students
Pages: 1  |  ...  |  139  |  140  |  141  |  142  |  143  |  144  |  145  |  146  |  147  |  ...  |  227