Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet
Anderson, Catherine L. – ProQuest LLC, 2010
Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. This dissertation seeks to improve extant understanding of how…
Descriptors: Cues, Health Education, Hospitals, Health Conditions
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Data Quality Campaign, 2010
The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…
Descriptors: Information Security, Stakeholders, Technical Assistance, Feedback (Response)
Valentine, Sean; Kidwell, Roland E. – Quality Assurance in Education: An International Perspective, 2008
Purpose: This study aims to gauge business school student perceptions of the academic conduct of college professors, to determine students' ethical evaluations of certain potential faculty behaviors. The relationships between perceived faculty misconduct and several student demographic characteristics including sex and academic classification were…
Descriptors: Undergraduate Students, Teacher Effectiveness, Cheating, Familiarity
Bullis, Ronald K. – American Journal of Sexuality Education, 2008
Two recent federal court cases have addressed the constitutionality of using sexual surveys in public schools. This article compares these cases with an earlier case dealing with the same issue but reaching different results. This article also describes the constitutional rights of parents to educate their children and the school's rights to…
Descriptors: Public Schools, Parent Rights, Court Litigation, Sex Education
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Rubinstein-Ávila, Eliane – Journal of Language and Literacy Education, 2009
Whether a study is qualitative or quantitative, the process of data collection is not as orderly as it may seem when described in published research reports, articles, or books. Data collection may be more challenging when conducting research across national and linguistic borders. In this article, I share and reflect upon the complex and messy…
Descriptors: Educational Research, Research Problems, Research Opportunities, Data Collection
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Computer and Business Equipment Manufacturers Association, Washington, DC. – 1979
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
Descriptors: Bibliographies, Computers, Data Processing, Information Systems
Peer reviewedFerguson, Lucy Rau – Journal of Social Issues, 1978
This paper holds that children should participate in research only under conditions of adequately informed consent, that parents must be fully informed about research procedures and purposes, but that parental consent is a sufficient condition only for children without adequate capacity for informed choice. (Author)
Descriptors: Child Welfare, Experiments, Parent Role, Participation
Siehl, George – Library Journal, 1972
From sampling the sensational and the scholarly literature cited in this article, one can piece together a representative picture of the American intelligence community. (42 references) (Author/NH)
Descriptors: Annotated Bibliographies, Books, Federal Government, Fiction
Flygare, Thomas J. – Phi Delta Kappan, 1979
The legality of warrantless searches of students depends on the kind of search that takes place and what happens to any evidence obtained during the search. (Author/IRT)
Descriptors: High School Students, Privacy, Search and Seizure, Secondary Education
Marwick, Christine M. – Library Journal, 1979
Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)
Descriptors: Censorship, Confidentiality, Federal Regulation, Information Dissemination
Peer reviewedFriedman, Batya – Computers in Human Behavior, 1997
Describes two complementary studies that were conducted to understand the diverse views adolescents hold regarding electronic information. One study examined high school students' concepts of property pertaining to copying computer programs; the other examined concepts of privacy pertaining to accessing computer files. (56 references) (Author/LRW)
Descriptors: Adolescents, Computer Software, Privacy, Secondary Education

Direct link
