NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,801 to 1,815 of 3,386 results Save | Export
Chow, Chi Yin – ProQuest LLC, 2010
Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…
Descriptors: Reaction Time, Privacy, Geographic Information Systems, Geographic Location
Friday, Brenda E. – ProQuest LLC, 2010
Research indicates that students residing at four-year institutions have been using online social networking sites such as Facebook as a means of efficient communication with one another. The technological advancements of social networking have also been identified as a means of creating community and belonging that may improve overall student…
Descriptors: Learner Engagement, Socialization, Student Attitudes, Social Networks
Soler, Mark; Breglio, Amy – Abell Foundation, 2010
Any analysis of confidentiality laws begins with a discussion of the interests involved. Children and families involved in the juvenile justice system have important interests in keeping their records confidential, yet, at the same time, when youth under the care or custody of state or local agencies commit violent crimes, or are the victims of…
Descriptors: At Risk Students, Confidential Records, Confidentiality, Juvenile Justice
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shudong; Heffernan, Neil – British Journal of Educational Technology, 2010
Pedagogical theories and the applications of information technology for language learning have been widely researched in various dimensions. However, ethical issues, such as online privacy and security, and learners' personal data disclosure, are not receiving enough research attention. The perceptions and attitudes from those who participate in…
Descriptors: Information Technology, Educational Technology, Ethics, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Henderson, Michael; de Zwart, Melissa; Lindsay, David; Phillips, Michael – Australian Educational Computing, 2010
There are significant privacy, intellectual property, copyright and disclosure risks associated with the ill-considered use of social networking sites, however, the implementation of regulatory actions may also undermine the social and emerging educational utility of social networking sites for young people. Inevitably the burden of dealing with…
Descriptors: Educational Strategies, Legal Problems, Intellectual Property, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Gritter, James L. – Child Welfare League of America (NJ3), 2009
Building on previous books by the author, "Hospitious Adoption: How Hospitality Empowers Children and Transforms Adoption" examines the next step after open adoption. Gritter takes the approach that practicing goodwill, respect, and courage within the realm of adoption makes the process move smoother and enriches children's lives. Following a…
Descriptors: Adoption, Prosocial Behavior, Interpersonal Relationship, Ethics
Parry, Marc – Chronicle of Higher Education, 2009
Distance educators won't have to become FBI-style investigators, installing cameras in the homes of online students and scanning fingerprints to ensure that people are who they say they are. At least not yet. The recently reauthorized Higher Education Opportunity Act requires accreditors to monitor steps colleges take to verify that an enrolled…
Descriptors: Distance Education, Privacy, Online Courses, Federal Regulation
Schmidt, Cynthia Martin – Library Media Connection, 2009
Many school library media specialists (LMS) would gladly pass along the responsibility of teaching online safety. Others may feel that it is the job of the computer lab personnel, the classroom teacher, or the parent. So how does the LMS fit into this scenario? While it is certainly appropriate for parents and classroom teachers to take joint…
Descriptors: School Libraries, Librarians, Role, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security
Robelen, Erik W. – Education Week, 2009
As it weighs the high-profile case of a 13-year-old girl strip-searched at school, the U.S. Supreme Court is grappling with where to draw the line between protecting student privacy rights and allowing school officials to take steps to ensure a safe environment. During oral arguments, several of the justices seemed sympathetic to the challenges…
Descriptors: School Nurses, Drug Use, Search and Seizure, Privacy
Dickstein, Gary G. – ProQuest LLC, 2011
This study contributes to the research regarding processes and procedures utilized by two institutions of higher education to respond to students who participate in inappropriate behavior and who are concomitantly experiencing a mental health crisis. A case study analysis of two institutions of higher education was used to examine this issue. The…
Descriptors: Higher Education, Intervention, Discipline, Mental Health
Picciano, Anthony G. – Journal of Asynchronous Learning Networks, 2012
Data-driven decision making, popularized in the 1980s and 1990s, is evolving into a vastly more sophisticated concept known as big data that relies on software approaches generally referred to as analytics. Big data and analytics for instructional applications are in their infancy and will take a few years to mature, although their presence is…
Descriptors: Higher Education, Decision Making, Data, Data Analysis
Dotinga, Randy – Chronicle of Higher Education, 2008
Tags such as the radio-frequency identifications or RFIDs are devices that make it possible for individuals to be tracked and their location reported back to a database. The devices--chips with radio antennas--emit signals, and tracking them reveals the movement of people or things. Many stores use the technology to catch shoplifters at exits. To…
Descriptors: Experiments, Privacy, Electromechanical Technology, State Universities
Skeels, Meredith McLain – ProQuest LLC, 2010
Friends, family, and community provide important support and help to patients who face an illness. Unfortunately, keeping a social network informed about a patient's health status and needs takes effort, making it difficult for people who are sick and exhausted from illness. Members of a patient's social network are often eager to help, but can be…
Descriptors: Patients, Social Networks, Health Conditions, Information Dissemination
Pages: 1  |  ...  |  117  |  118  |  119  |  120  |  121  |  122  |  123  |  124  |  125  |  ...  |  226