Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
ALA Editions, 2010
Updated for the first time since 2005, this indispensable volume includes revised interpretations of the Library Bill of Rights along with key intellectual freedom guidelines and policies, including: (1) A new chapter, "Interactivity and the Internet," and other fresh material on intellectual freedom and privacy in online social…
Descriptors: Intellectual Freedom, Constitutional Law, Access to Information, Confidentiality
Fowley, Cathy, Ed.; English, Claire, Ed.; Thouësny, Sylvie, Ed. – Research-publishing.net, 2013
From 2000 to 2012 the number of Internet users rose from less than 0.4 billion to 2.4 billion. Scholarly, evidence-based Internet research is of critical importance. The field of Internet research explores the Internet as a social, political and educational phenomenon, providing theoretical and practical contributions to understanding, and…
Descriptors: Foreign Countries, Internet, Online Searching, Use Studies
Toglia, Thomas V. – Tech Directions, 2007
The Family Educational Rights and Privacy Act (FERPA) has significant implications for career and technical educators. Although FERPA was enacted in 1974 to oversee the privacy, discharge, and accuracy of educational records, many administrators and instructors are uncertain about how FERPA applies to their students. In this article, the author…
Descriptors: Student Records, Privacy, Compliance (Legal), Career Education
Bracy, Nicole L. – ProQuest LLC, 2009
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Descriptors: Public Schools, Violence, School Security, Educational Environment
National Association for the Education of Homeless Children and Youth, 2010
The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records. Specifically, it prohibits a school from disclosing personally identifiable information from students' education records without the consent of a parent or eligible student, unless an exception to FERPA's general consent…
Descriptors: Student Records, Technical Assistance, Privacy, Homeless People
Singh, Anil; Mangalaraj, George; Taneja, Aakash – Journal of Information Systems Education, 2010
This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various…
Descriptors: Online Courses, Teaching Methods, Technology Uses in Education, Technology Integration
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Steeves, Valerie; Webster, Cheryl – Bulletin of Science, Technology & Society, 2008
Empirical data from a large sample of Canadian youth aged 13 to 17 years suggest that, although the current privacy policy framework is having a positive effect on the extent to which young people are complying with the types of behavior promoted by adults as privacy protective, its primary focus on parental supervision is inadequate to fully…
Descriptors: Adolescents, Social Environment, Parent Child Relationship, Internet
Supiano, Beckie – Chronicle of Higher Education, 2008
Leaders at Indiana University of Pennsylvania had heard the horror stories: Students would be accepted here, visit the campus, take one look at the outdated dormitories, and decide to go someplace else. Something had to be done. So they made the bold move to replace all student housing, bed for bed--at a cost of $270-million. The public university…
Descriptors: Dormitories, College Housing, Student Recruitment, Living Learning Centers
Shoop, Robert J. – Principal Leadership, 2008
The Family Educational Rights and Privacy Act (FERPA) was passed in 1974 and revised in 1996. This act, also known as the Buckley Amendment, guarantees parents access to their children's education records and limits the disclosure of those records. The revised law regards most information that teachers, school administrators, and education…
Descriptors: Student Records, Privacy, Student Rights, Federal Legislation
Data Quality Campaign, 2011
Statewide Longitudinal Data Systems (SLDS) provide the information and tools needed to inform policies, practices and decisions at every level to improve student achievement and system performance. It is equally important that there are policies and practices to protect personally identifiable information and to ensure the confidentiality and…
Descriptors: State Agencies, Student Records, Privacy, Information Security
Wells, Cris – ProQuest LLC, 2010
Throughout history human subject research has been plagued by researchers whose studies were riddled with danger and/or risk to their subjects. Indeed, one may cite numerous situations where human subjects were injured and/or killed in experiments that were designed with no thought or anticipation of risk to the subjects. As a result, the federal…
Descriptors: Patients, Research, Participant Characteristics, Experimental Groups
Junco, Reynol; Chickering, Arthur W. – About Campus, 2010
For centuries, issues of civil discourse only arose concerning written and oral communication. But now, new technologies for communication and social interaction, particularly social media, have dramatically expanded the potential for human interaction. They generate significant challenges for institutional policies and practices to encourage and…
Descriptors: Interpersonal Relationship, Opportunities, Interaction, Technological Advancement
Ostrowsky, Ben – Computers in Libraries, 2005
Like the Lone Ranger's mask, a good information retention policy can safeguard personal identity information. Librarians want to be sure that patrons will return what they borrow, and they want statistics that quantify the library's value to its community. Librarians also want to protect customers' privacy; they usually don't keep personally…
Descriptors: Privacy, Library Services
Rikleen, Lauren Stiller – Chronicle of Higher Education, 2007
The recent events at Virginia Tech reinforce the idea that nothing is more fundamental for college leaders to address than campus security and safety. After the tears, the makeshift memorials, and the intensely painful series of funerals, higher education must come to grips with the fact that it has just had its own September 11. Assessing and…
Descriptors: School Security, Privacy, School Safety, Crime Prevention

Direct link
Peer reviewed
