Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fischer, Karin; Wilson, Robin – Chronicle of Higher Education, 2007
This article reports on the findings of the state panel on the Virginia Tech massacre. A state panel that investigated last spring's massacre at Virginia Tech has issued a harshly worded report that says the university erred in the way it handled a mentally disabled student who became a killer and in how it dealt with the immediate aftermath of…
Descriptors: Reports, School Security, Crisis Management, College Administration
Peer reviewedMaisonrouge, J. G. – Information Society, 1981
Describes the current status of developments concerning the regulation of information flow across national borders. Similarities and trends in various privacy laws from European countries are discussed, as are the business position on data protection and efforts to harmonize national laws. (SW)
Descriptors: Information Processing, International Relations, Laws, Privacy
Peer reviewedHample, Dale – Argumentation and Advocacy, 1988
Asks whether different kinds of arguments are essentially similar or different. Considers three kinds of argument as potentially the primary argument. Rejects each, concluding that these kinds of argument are fundamentally similar. Focuses on the ideas of publicness, sociality, and cognition, assuming these to be the main possibilities for…
Descriptors: Discourse Analysis, Persuasive Discourse, Privacy, Rhetoric
Peer reviewedMartin, Kelly – T.H.E. Journal, 2004
It used to be that Internet threats were aimed at disabling their targets. The most common payload of yesterday's viruses, worms and other malicious code either caused system instability or, perhaps, deleted certain files. In many cases, these threats announced their arrival by flashing messages on the computer screen or causing some other…
Descriptors: Computer Security, Computer Software, Privacy, Internet
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
VanFossen, Phillip J.; Berson, Michael J. – Contemporary Issues in Technology and Teacher Education (CITE Journal), 2008
Young people today consume large amounts of information through various media outlets and simultaneously create and distribute their own messages via information and communication technologies and massively multiplayer online gaming. In doing so, these "digital natives" are often exposed to violent, racist, or other deleterious messages.…
Descriptors: Social Studies, Teaching Methods, Information Technology, Critical Literacy
Conger, Sharmila Basu – State Higher Education Executive Officers, 2008
Student achievement depends upon successful passage through a series of transitions: elementary to middle school, middle school to high school, high school to college. Increasing the efficiency of successful transitions requires the collection and analysis of student data across these transition points. Yet long-standing separations between…
Descriptors: Data, State Programs, Information Systems, Academic Achievement
Seock, Yoo-Kyoung; Norton, Marjorie J. T. – College Student Journal, 2008
The purpose of this study was to examine perceptions of attributes of clothing retailers' Internet websites in relation to previous and intended future purchase from the websites. Survey data from 414 U.S. college students, non-married and aged 18-22 with online clothing shopping experience and favorite clothing websites were used. Five clothing…
Descriptors: College Students, Merchandise Information, Consumer Education, Factor Analysis
James, Nalita; Busher, Hugh – International Journal of Research & Method in Education, 2007
Educational researchers have a responsibility to ensure that in whatever research paradigm they work, the research that is conducted is done so within an "ethic of respect" to those who participate. This implies a number of responsibilities on the part of the researcher that include ensuring trust, dignity, privacy, confidentiality and anonymity.…
Descriptors: Internet, Confidentiality, Qualitative Research, Educational Researchers
Reutty, Michele – Computers in Libraries, 2007
Michele Reutty was director of the Free Public Library of Hasbrouck Heights for 17 years. Hasbrouck Heights is a mile-square "bedroom community" of New York City that is located in northern New Jersey. In this article, she narrates her experience--one that probably occurs with alarming regularity to professional librarians all over the…
Descriptors: Law Enforcement, Public Libraries, Police, Intellectual Freedom
Indiana Department of Education, 2010
As the parent of a child who has or may have a disability, the federal and state laws give them certain rights--called procedural safeguards. If they would like a more detailed explanation of these rights, they should contact the principal of their child's school, a school administrator, their local special education director, or any of the…
Descriptors: Disabilities, Special Education, Administrators, State Departments of Education
Data Quality Campaign, 2010
This report presents survey results of the 10 State Actions including status of all 50 states, the District of Columbia and Puerto Rico. These State Actions include: (1) Link P-20/workforce data systems; (2) Create stable, sustained support for robust state longitudinal data systems; (3) Develop governance structures to guide data collection,…
Descriptors: Stakeholders, Governance, Foreign Countries, Educational Change
Cruise, Christie Ann – ProQuest LLC, 2009
A 1998 amendment to the Family Educational Rights and Privacy Act was clear in permitting colleges and universities to notify parents of students under age 21 when they have been found responsible for "a disciplinary violation with respect to such use or possession" of alcohol or any controlled substance (FERPA, 20 U.S.C. section 1232g,…
Descriptors: Recidivism, Grade Point Average, Alcohol Abuse, Predictor Variables
US Department of Education, 2008
"Lessons Learned" is a series of publications that are a brief recounting of actual school emergencies and crises. This "Lessons Learned" issue focuses on an incident involving several cases of Methicillin-resistant Staphylococcus aureus (MRSA) at a rural high school. MRSA is a specific strain of Staphylococcus aureus bacteria (often called staph)…
Descriptors: Communicable Diseases, Disease Control, Rural Schools, High Schools
Kanstoroom, Marci, Ed.; Osberg, Eric C., Ed. – Thomas B. Fordham Institute, 2008
America brims with education data and these days it seems everyone in education claims to be guided by data. In this book, leaders and scholars map the landscape of data providers and users and explores why what is supplied by the former but frequently fails to meet the needs of the latter. It documents the barriers to collecting good information,…
Descriptors: Education, Data, Data Analysis, Data Collection

Direct link
