NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,081 to 1,095 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Su, Shu-Ching; Sedory, Stephen A.; Singh, Sarjinder – Sociological Methods & Research, 2015
In this article, we adjust the Kuk randomized response model for collecting information on a sensitive characteristic for increased protection and efficiency by making use of forced "yes" and forced "no" responses. We first describe Kuk's model and then the proposed adjustment to Kuk's model. Next, by means of a simulation…
Descriptors: Data Collection, Models, Responses, Efficiency
Englander, Elizabeth – Educational Leadership, 2015
Most kids are very much aware that the Internet isn't, by and large, a private space. In fact, most teens have been hearing that message since elementary school. But despite being educated about these issues, many teens continue to engage in digital behaviors that imply that they really don't understand how public and permanent the Internet really…
Descriptors: Internet, Computer Mediated Communication, Adolescents, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Millett, Stephan; O'Leary, Peter – Research Ethics, 2015
This paper argues that specific individual informed consent and other forms of consent predicated on a right to autonomy may not in all circumstances be appropriate for the establishment and use of large data sets of health information. We suggest that there are inherent failings in such an approach, shortcomings that we analyse below. We argue…
Descriptors: Informed Consent, Access to Information, Databases, Health
Peer reviewed Peer reviewed
Direct linkDirect link
Crossen-White, Holly L. – Research Ethics, 2015
Online digital archives have allowed researchers to explore the past as never before. Arguably without the search technology offered by online digital archives the lives of many individuals would have remained in obscurity. Furthermore, the level of detail that can be quickly gleaned about individuals from the past, particularly when multiple…
Descriptors: Archives, Information Storage, Ethics, History
Peer reviewed Peer reviewed
Direct linkDirect link
Raible, Claire A.; Dick, Rebecca; Gilkerson, Fern; Mattern, Cheryl S.; James, Lisa; Miller, Elizabeth – Journal of School Health, 2017
Background: Project Connect is a national program to build partnerships among public health agencies and domestic violence services to improve the health care sector response to partner and sexual violence. Pennsylvania piloted the first school nurse-delivered adolescent relationship abuse intervention in the certified school nurses' office…
Descriptors: School Nurses, Prevention, Intervention, Surveys
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan – Information Research: An International Electronic Journal, 2017
Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…
Descriptors: Foreign Countries, College Students, Gender Differences, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Pantas, Susanna; Miller, Sean A.; Kulkarni, Shanti J. – Journal of Teaching in Social Work, 2017
Social work students created a community activism project to raise awareness about trauma prevalence and impact. Trauma theory describes silencing as the mechanism that hinders individual and community healing. Therefore, students sought to create an interactive opportunity to heighten trauma visibility on campus. They created a physical mailbox…
Descriptors: Activism, Social Work, Counselor Training, Trauma
Ingersoll, Julia S. – ProQuest LLC, 2017
On April 16, 2007, a student at Virginia Tech University, known to be mentally ill, went on a rampage shooting 49 people on campus before taking his own life. When it was over, 32 people were dead, and the concept of a safe campus was forever changed. The incident revealed the inherent conflicts between campus safety concerns and students' civil…
Descriptors: College Students, School Safety, Civil Rights, Violence
Roberson, Amanda Janice; Rorison, Jamey; Voight, Mamie – Institute for Higher Education Policy, 2017
Accurate and complete data can empower college choices, promote student success, and inform federal, state and institutional policies. Yet existing postsecondary student data systems are disconnected, duplicative and incomplete. "A Blueprint for Better Information: Recommendations for a Federal Postsecondary Student-Level Data Network"…
Descriptors: Postsecondary Education, Student Records, Information Storage, Information Security
Council of the Great City Schools, 2017
Equipping today's children with 21st century skills for the digital age requires turning traditional classrooms into a digital-learning ecosystem and ensuring teachers have professional skills and unfettered access to tools they need for 21st century teaching and learning. School district networks are being used for instruction, business, and…
Descriptors: Information Security, Educational Technology, Information Management, Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Burgunder, Lee B. – Journal of Legal Studies Education, 2016
Richard Prince a well-known appropriation artist, made headlines by pressing ever deeper into the gray areas of art, technology, and the law. Specifically, Prince took screenshots of personal photographs that were publicly displayed on Instagram accounts, included his own comments, enlarged and printed them on large canvases, and displayed them at…
Descriptors: Photography, Visual Aids, Social Media, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
Zeide, Elana – State Education Standard, 2016
Since 2013, most states have considered one or more bills to protect student data, with many giving state boards of education more authority in this arena. The best of this legislation goes beyond compliance to better address stakeholders' fears. States that take this approach have adopted two key practices in implementation of new state laws:…
Descriptors: Student Records, Privacy, Information Security, State Legislation
Adams, Helen R. – Knowledge Quest, 2016
The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…
Descriptors: Privacy, Consciousness Raising, Internet, Child Safety
Data Quality Campaign, 2016
Student data privacy was a priority issue in state legislatures in 2016, though as expected, states passed fewer student data privacy bills into law than they did in 2014 and 2015. The privacy conversation has evolved since 2014, and now states have the ability to borrow from each other: California's 2014 Student Online Personal Information…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Daniel, John – Council for Higher Education Accreditation, 2018
Faster and more wide-ranging innovation is often urged as the key to solving the various challenges that currently face humankind, from climate change to income inequality. This article looks at a complex example of innovation, the portability of qualifications proposed in the "Groningen Declaration on Student Data Depositories…
Descriptors: Innovation, Privacy, Trust (Psychology), Student Mobility
Pages: 1  |  ...  |  69  |  70  |  71  |  72  |  73  |  74  |  75  |  76  |  77  |  ...  |  226