Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ivie, Ashlee – Journal of the American Academy of Special Education Professionals, 2016
This paper examines the use of cameras in self-contained special education classrooms. It begins with an examination of the legal framework used when administrators are contemplating the implementation of video surveillance within the classroom. It gives a brief summary of the Family Educational Rights and Privacy Act, Individuals with…
Descriptors: Video Technology, Self Contained Classrooms, Special Education, Legal Responsibility
McShane, Ian; Dearman, Philip – Australian Association for Research in Education, 2016
This paper examines the rise and fall of the Victorian education department's learning management system Ultranet. The Ultranet was conceived as a web-based portal that was designed to integrate and deliver on a range of policy objectives in the areas of student management, school networking and communication, and teaching and learning. Heavily…
Descriptors: Foreign Countries, Educational Technology, Computer Software, Technology Integration
Simon, Jason C. – Journal of Electronic Resources Librarianship, 2014
This article alerts academic libraries to some of the methods for purchasing electronic books (e-books) and notes that, while they are similar to the models used for journal-evaluation purposes, there are a number of factors important to consider that are different for e-books. Simon notes that, while theoretically there should be some advantages…
Descriptors: Electronic Publishing, Books, Academic Libraries, Purchasing
Almes, Guy T.; Zottola, Ralph J. – EDUCAUSE, 2014
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
Descriptors: Data Collection, Data Analysis, Higher Education, Technology Uses in Education
Almes, Guy T.; Hillegas, Curtis W.; Lance, Timothy; Lynch, Clifford A.; Monaco, Gregory E.; Mundrane, Michael R.; Zottola, Ralph J. – EDUCAUSE, 2014
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
Descriptors: Data Collection, Data Analysis, Higher Education, Technology Uses in Education
Privacy Technical Assistance Center, 2014
Educational agencies and institutions increasingly collect and maintain large amounts of data about students in order to provide educational services. Some data, like students' transcript information, may need to be preserved indefinitely. Other student information will need to be preserved for a prescribed period of time to comply with legal or…
Descriptors: Best Practices, Information Management, Information Security, Data
Lawrence, Cameron; Olson, Garrett; Douma, Bambi – Information Systems Education Journal, 2015
The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…
Descriptors: Information Security, Computer Security, Global Approach, Travel
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
McKenna-Buchanan, Tim; Munz, Stevie; Rudnick, Justin – Communication Education, 2015
Lesbian, gay, and queer (LGQ) teachers often deal with the tension between disclosing and concealing their sexual orientations in the college classroom. This article presents the results of a qualitative interview study with 29 self-identified LGQ college teachers about their choices to disclose or conceal their sexual identities. Using…
Descriptors: College Faculty, Homosexuality, Sexual Orientation, Self Disclosure (Individuals)
Eckhoff, Angela – Early Child Development and Care, 2015
This research examines a multi-year investigation of preschoolers' experiences participating in a media-driven exploration of informal play experiences as a means to engage children as artists, researchers, and documenters of their own worlds. In this writing, I will explore the ethical issues that arise for adult researchers engaged in…
Descriptors: Preschool Children, Early Childhood Education, Play, Ethics
Adeyeye, Adebisi – ProQuest LLC, 2015
Electronic medical record (EMR) use has improved significantly in health care organizations. However, many barriers and factors influence the success of EMR implementation and adoption. The purpose of the descriptive qualitative single-case study was to explore health care professionals' perceptions of the use of EMRs at a hospital division of a…
Descriptors: Records (Forms), Allied Health Personnel, Hospitals, Information Storage
Chen, Elizabeth; Barrington, Clare – American Journal of Sexuality Education, 2017
Formal sexuality education in schools is declining in the United States and this is disproportionately affecting adolescents in rural settings. The purpose of this qualitative study was to assess student and teacher perception of sexuality education delivered online as a potential solution to address this gap in access. Nine gender-specific group…
Descriptors: Sexuality, Sex Education, Privacy, Online Courses
Moakofhi, Moakofhi; Leteane, Oratile; Phiri, Tawona; Pholele, Thato; Sebalatlheng, Perncy – International Journal of Education and Development using Information and Communication Technology, 2017
The integration of technology in the education process has immensely improved the acquisition and retention of knowledge. Although e-learning initiatives bring many advantages to the education system, these rewards have not been fully realised in developing countries like Botswana. Therefore, in the current study, authors set out to identify…
Descriptors: Foreign Countries, Electronic Learning, Barriers, Agricultural Education
Mahmoud, Ali Bassam; Grigoriou, Nicholas – Higher Education Quarterly, 2017
This study examines and compares word of mouth (WOM) behaviour among university students in Syria. To date, little is known about this important phenomenon which is surprising given the deregulated education market in Syria that allows for private universities to compete for students alongside public universities. Using a mixed methods research…
Descriptors: Empathy, Privacy, College Students, Foreign Countries
Laird, Robert D.; Marrero, Matthew D.; Melching, Jessica; Kuhn, Emily S. – Journal of Adolescence, 2013
Studies of privacy invasion have relied on measures that combine items assessing adolescents' feelings of privacy invasion with items assessing parents' monitoring behaviors. Removing items assessing parents' monitoring behaviors may improve the validity of assessments of privacy invasion. Data were collected from 163 adolescents (M age 13 years,…
Descriptors: Validity, Adolescents, Mothers, Privacy

Peer reviewed
Direct link
