Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
National Council on Measurement in Education, 2012
Testing and data integrity on statewide assessments is defined as the establishment of a comprehensive set of policies and procedures for: (1) the proper preparation of students; (2) the management and administration of the test(s) that will lead to accurate and appropriate reporting of assessment results; and (3) maintaining the security of…
Descriptors: State Programs, Integrity, Testing, Test Preparation
Anwar, Mohd; Greer, Jim – International Journal of Artificial Intelligence in Education, 2012
An e-learning discussion forum, an essential component of today's e-learning systems, offers a platform for social learning activities. However, as learners participate in the discussion forum, privacy emerges as a major concern. Privacy concerns in social learning activities originate from one learner's inability to convey a desired presentation…
Descriptors: Foreign Countries, Electronic Learning, Socialization, Learning Activities
Simmons, Catherine A.; Rycraft, Joan R. – Social Work, 2010
Often faced with ethical challenges that may appear extraordinary, military social workers comprise a distinctive subgroup of the social work profession. From the unique paradigms in which they practice their craft, obvious questions about how military social workers address the ethical challenges inherent to their wartime mission arise. Using a…
Descriptors: Concept Mapping, Confidentiality, Foreign Countries, Ethics
Mesch, Gustavo S.; Beker, Guy – Human Communication Research, 2010
This study investigated whether norms of self-disclosure of one's online and offline identity are linked to online disclosure of personal and intimate information. We expected online disclosure of personal and intimate information to be associated with norms of online disclosure. Secondary analysis of the 2006 Pew and American Life Survey of…
Descriptors: Computer Mediated Communication, Social Behavior, Behavior Standards, Hypothesis Testing
Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T. – Journal of Marketing Education, 2010
An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…
Descriptors: Business Administration Education, Business Education, Information Policy, Privacy
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Ryan, Sherry D.; Magro, Michael J.; Sharp, Jason H. – Journal of Information Technology Education, 2011
Social networking sites have seen tremendous growth and are widely used around the world. Nevertheless, the use of social networking sites in educational contexts is an under explored area. This paper uses a qualitative methodology, autoethnography, to investigate how social networking sites, specifically Facebook[TM], can help first semester…
Descriptors: Foreign Countries, Doctoral Programs, Social Networks, Web Sites
Hasan, Syed Omair – ProQuest LLC, 2009
This work proposes an organizational framework for creating a community to share personal health record (PHR) information in the form of a Health Records Social Network (HRSN). The work builds upon existing social network community concepts as well as the existing Systemized Nomenclature of Medicine (SNOMED) model used by the medical community and…
Descriptors: Patients, Confidential Records, Information Transfer, Causal Models
Kumar, Rajeev – ProQuest LLC, 2009
This dissertation contributes to the society by providing mechanisms that can potentially increase the availability of valuable personal level information without sacrificing the privacy of citizens. We consider two settings by which personal level data can be made available to its users such as researchers, who then may use it for the benefit of…
Descriptors: Access to Information, Researchers, Privacy, Research
Russo, Charles J. – School Business Affairs, 2009
Maintaining a safe, orderly learning environment is a significant challenge for education leaders, especially when students insist on bringing alcohol, weapons, and drugs into schools. To compound that challenge, educators who wish to uncover contraband must do so within the confines of the Fourth Amendment's prohibition against unreasonable…
Descriptors: Educational Environment, School Safety, Student Rights, Privacy
Hosek, Angela M.; Thompson, Jason – Communication Education, 2009
This study examines the ways in which privacy rules are developed and boundaries are coordinated within the student-teacher relationship using Petronio's Communication Privacy Management theory as a framework. Forty-one college instructors described the specific criteria they use to develop privacy rules and the conditions under which boundaries…
Descriptors: Privacy, Self Disclosure (Individuals), Teacher Student Relationship, College Faculty
Fallon, Gerald; Barnett, John – International Journal of Education Policy and Leadership, 2009
This case study tells the story of an elementary school staff on the west coast of Canada that decided to address their perceived problem of teacher isolation by transforming the internal organization of their school into a collaborative environment designed to foster collegial practices among themselves. The main guiding question of this study…
Descriptors: Foreign Countries, School Organization, School Culture, Professional Isolation
Loui, Michael C. – Bulletin of Science, Technology & Society, 2009
In a small course on technology and society, students participated in an extended role-play simulation for two weeks. Each student played a different adult character in a fictional community, which faces technological decisions in three scenarios set in the near future. The three scenarios involved stem cell research, nanotechnology, and privacy.…
Descriptors: Instructional Design, Role Playing, Simulation, Science and Society
Wendt, Sarah – Journal of Rural Studies, 2009
Studies of domestic violence in rural areas have predominantly focused on barriers that keep women trapped in abusive relationships. The literature has frequently suggested that rural culture influences the incidence of domestic violence, the forms it takes, and how it is experienced. Yet there is surprisingly little research on how rural culture…
Descriptors: Family Violence, Females, Christianity, Rural Areas
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security

Peer reviewed
Direct link
