NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,681 to 1,695 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Schrodt, Paul – Communication Education, 2013
Using Petronio's communication privacy management theory, this study tested the degree to which content relevance and students' comfort with instructor disclosures moderated the association between instructor disclosures (i.e., frequency and appropriateness) and credibility (i.e., competence, trustworthiness, and goodwill) in the college…
Descriptors: Privacy, College Faculty, Credibility, Self Disclosure (Individuals)
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cibangu, Sylvain K. – Information Research: An International Electronic Journal, 2013
Introduction: Just as we have created them, the new social media technologies have shaped every aspect of our societies. Meanwhile, information science has hardly addressed the ways in which these information technologies have shaped humans, and vice-versa. The major reason is the tendency and pressure to adjust (the needs of) humans to the ever…
Descriptors: Information Science, Information Science Education, Information Technology, Relevance (Education)
Peer reviewed Peer reviewed
Direct linkDirect link
Binder, Perry; Mansfield, Nancy R. – Journal of Legal Studies Education, 2013
The explosion of social networks and the growing concern over privacy in the digital age--both in the United States and Europe--have provided an opportunity to introduce students to the legal risks of using social media in the workplace. This article builds on the authors' classroom experiences and provides social media scenarios and projects that…
Descriptors: Business Administration Education, Law Related Education, Social Networks, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
McGill, Shelley – Journal of Legal Studies Education, 2013
Aaron Sorkin has a passion for words--his signature movie and television scripts are fast talking, jargon laced, word pictures that are instantly recognizable. "The Social Network," Sorkin's 2011 Academy Award Winning movie about the founding of Facebook, Inc., offers more than just witty banter; it provides an ideal teaching platform for…
Descriptors: Business Administration Education, Law Related Education, Undergraduate Students, Films
Peer reviewed Peer reviewed
PDF on ERIC Download full text
National Forum on Education Statistics, 2011
This document, "Book Three of Four: Effectively Managing LDS Data," is the third installment of this Forum series of guides on longitudinal data systems (LDS). This third book in the guide series discusses organizational issues aimed at moving the project forward and ensuring that the data are of high quality so that users may leverage…
Descriptors: Information Systems, Information Management, Data, Organization
Data Quality Campaign, 2011
As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…
Descriptors: State Policy, Data Collection, Databases, Student Records
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Mulholland, Jessica – Education Digest: Essential Readings Condensed for Quick Review, 2012
In New York's Port Washington Union Free School District, security and privacy for students, faculty, and staff coexist--thanks to security cameras with eyelids. In 2010, video cameras donated by New York-based SituCon Systems were installed in the main lobby at two of the district's seven schools. "We really haven't had the kind of incidents…
Descriptors: School Security, Video Technology, Photography, Technology Uses in Education
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Glick, David Matthew – ProQuest LLC, 2010
This research explores how organizations decide how to respond to the laws that affect them. It investigates how they convert abstract legal changes into concrete policy responses. Much of the legal impact literature focuses exclusively on either on legal institutions and social outcomes, or on the dynamics within organizations. This work…
Descriptors: Higher Education, Laws, Responses, Policy Formation
Peer reviewed Peer reviewed
Direct linkDirect link
Wihbey, Jean A. – Visions, 2010
Most traditional age college students communicate regularly on social networking sites such as, MySpace, Facebook, Friendster, Bebo, and LiveJournal. These are member-based internet communities that allow users to create a username, enter personal profile information, post photographs and communicate with others in innovative ways. Since Facebook…
Descriptors: College Students, Privacy, Interaction, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Stormont, Sam – Public Services Quarterly, 2010
The creation of an instant messaging (IM) service is described. The challenges encountered in developing, launching, and maintaining the project are examined and include technical support, archiving, balancing different formats, privacy, assessment, training, and the effectiveness of the IM channel. The process of choosing an aggregator and a…
Descriptors: Reference Services, Computer Mediated Communication, Technical Support, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Melki, Jad P. – Journal of Media Literacy Education, 2015
The role of new media in the Arab uprisings and the news of widespread surveillance of digital and mobile media have triggered a renewed interest in Arab audiences research, particularly as it pertains to these audiences' critical abilities and digital media literacy competencies. Taken for granted have been Arab youth's widespread use of social…
Descriptors: Critical Literacy, Media Literacy, Arabs, Audiences
Peer reviewed Peer reviewed
Direct linkDirect link
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Pages: 1  |  ...  |  109  |  110  |  111  |  112  |  113  |  114  |  115  |  116  |  117  |  ...  |  227