NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,816 to 1,830 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Gritter, James L. – Child Welfare League of America (NJ3), 2009
Building on previous books by the author, "Hospitious Adoption: How Hospitality Empowers Children and Transforms Adoption" examines the next step after open adoption. Gritter takes the approach that practicing goodwill, respect, and courage within the realm of adoption makes the process move smoother and enriches children's lives. Following a…
Descriptors: Adoption, Prosocial Behavior, Interpersonal Relationship, Ethics
Parry, Marc – Chronicle of Higher Education, 2009
Distance educators won't have to become FBI-style investigators, installing cameras in the homes of online students and scanning fingerprints to ensure that people are who they say they are. At least not yet. The recently reauthorized Higher Education Opportunity Act requires accreditors to monitor steps colleges take to verify that an enrolled…
Descriptors: Distance Education, Privacy, Online Courses, Federal Regulation
Schmidt, Cynthia Martin – Library Media Connection, 2009
Many school library media specialists (LMS) would gladly pass along the responsibility of teaching online safety. Others may feel that it is the job of the computer lab personnel, the classroom teacher, or the parent. So how does the LMS fit into this scenario? While it is certainly appropriate for parents and classroom teachers to take joint…
Descriptors: School Libraries, Librarians, Role, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security
Robelen, Erik W. – Education Week, 2009
As it weighs the high-profile case of a 13-year-old girl strip-searched at school, the U.S. Supreme Court is grappling with where to draw the line between protecting student privacy rights and allowing school officials to take steps to ensure a safe environment. During oral arguments, several of the justices seemed sympathetic to the challenges…
Descriptors: School Nurses, Drug Use, Search and Seizure, Privacy
Dickstein, Gary G. – ProQuest LLC, 2011
This study contributes to the research regarding processes and procedures utilized by two institutions of higher education to respond to students who participate in inappropriate behavior and who are concomitantly experiencing a mental health crisis. A case study analysis of two institutions of higher education was used to examine this issue. The…
Descriptors: Higher Education, Intervention, Discipline, Mental Health
Picciano, Anthony G. – Journal of Asynchronous Learning Networks, 2012
Data-driven decision making, popularized in the 1980s and 1990s, is evolving into a vastly more sophisticated concept known as big data that relies on software approaches generally referred to as analytics. Big data and analytics for instructional applications are in their infancy and will take a few years to mature, although their presence is…
Descriptors: Higher Education, Decision Making, Data, Data Analysis
Skeels, Meredith McLain – ProQuest LLC, 2010
Friends, family, and community provide important support and help to patients who face an illness. Unfortunately, keeping a social network informed about a patient's health status and needs takes effort, making it difficult for people who are sick and exhausted from illness. Members of a patient's social network are often eager to help, but can be…
Descriptors: Patients, Social Networks, Health Conditions, Information Dissemination
Wilson, Alan – Online Submission, 2010
The materials include a general discussion of privacy that raises points and questions to engage students in the subject before they complete the hypothetical case study that follows in a three-part, workbook format. (Purpose) The purpose is to engage students in a critical thinking exercise that requires students to analyze a developing situation…
Descriptors: Decision Making, Moral Values, Critical Thinking, Ethics
Shahand, Assadullah – ProQuest LLC, 2010
Growing incidences of corporate ethical misconducts have revived the debate over ethical reasoning and moral development of corporate managers. The role of information technology (IT) in the ethical dilemmas is becoming more evident as virtual environments become increasingly popular, organizations adopt digital form of record keeping, and the…
Descriptors: Ethics, Decision Making, Moral Development, Moral Values
Williamson, Ronald – Principals' Partnership, 2010
The growing use of social media by students and staff has led many schools to consider developing acceptable use policies. There is tremendous opportunity for improving education through the use of social media. There is also potential risk because social media can be used to access age inappropriate information and to engage in aggressive online…
Descriptors: Intellectual Freedom, Internet, Social Networks, Educational Improvement
Peer reviewed Peer reviewed
Direct linkDirect link
Bathon, Justin M.; Brady, Kevin P. – NASSP Bulletin, 2010
In this technological age, the definition of private, public, and protected speech and expression for today's school employees is largely misunderstood and unclear. This article addresses the current legal standards as well as some recent case law involving teacher speech and expression and its major implications for addressing teacher online…
Descriptors: Teaching (Occupation), Computer Mediated Communication, Freedom of Speech, School Districts
Cossler, Christine – School Business Affairs, 2010
Privacy, something once taken for granted, has again become top-of-mind for public school districts thanks to technology's increasing reach, as well as new changes to privacy laws governing student information. Recently, educators have had to face important changes to the Family Educational Rights and Privacy Act (FERPA), originally signed into…
Descriptors: Student Records, School Safety, Courts, Privacy
Dotinga, Randy – Chronicle of Higher Education, 2008
Tags such as the radio-frequency identifications or RFIDs are devices that make it possible for individuals to be tracked and their location reported back to a database. The devices--chips with radio antennas--emit signals, and tracking them reveals the movement of people or things. Many stores use the technology to catch shoplifters at exits. To…
Descriptors: Experiments, Privacy, Electromechanical Technology, State Universities
Pages: 1  |  ...  |  118  |  119  |  120  |  121  |  122  |  123  |  124  |  125  |  126  |  ...  |  227