NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,146 to 2,160 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cate, Fred H. – EDUCAUSE Review, 2006
Colleges and universities face heightened responsibilities. They possess a large volume and variety of sensitive information on a wide range of individuals, and demands for this information are growing. The students that are educated, housed, and/or employed by colleges and universities tend to be in a vulnerable age cohort: eighteen- to…
Descriptors: Young Adults, Privacy, Vocational Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Dence, Thomas P.; Heath, Steven – Mathematics and Computer Education, 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how…
Descriptors: Technology, Probability, Number Concepts, Mathematical Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Essex, Nathan L. – Education and the Law, 2005
The Fourth Amendment to the US Constitution provides protection of all citizens against unreasonable search and seizure. The US Supreme Court has affirmed that the basic purpose of the Fourth Amendment is to safeguard the privacy and security of individuals against unreasonable intrusive searches by governmental officials. Since students possess…
Descriptors: Student Rights, Privacy, Public Schools, Search and Seizure
Ministerial Council for Education, Early Childhood Development and Youth Affairs (NJ1), 2009
The process of collecting student background information from parents using nationally agreed definitions of student background characteristics began in 2005. The original edition of this manual, titled "Data Implementation Manual for Enrolments for the 2005 and 2006 School Years," was prepared to assist schools and systems in modifying…
Descriptors: Foreign Countries, Enrollment, Student Characteristics, Elementary School Students
Rampell, Catherine – Chronicle of Higher Education, 2008
This article reports that several colleges and universities like Purdue University are mining data they have about students to try to improve retention. The institutions analyze years' worth of data on which students did well and which did poorly, and what variables--whether they be SAT scores, financial-aid status, or attendance at the dining…
Descriptors: Data Analysis, School Holding Power, Computer Mediated Communication, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Baker, Thomas R. – New Directions for Student Services, 2008
This chapter describes the relationship between federal student privacy laws and state privacy laws, and identifies the changes in the federal law over the last ten years affecting disclosure to parents of college students. Recent litigation on health emergencies is outlined and the limited rights of college students not yet eighteen years of age…
Descriptors: College Students, Access to Information, Privacy, Information Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Kurowski, Scotia; Reiss, Rebecca – American Biology Teacher, 2007
This article describes a forensic DNA science laboratory exercise for advanced high school and introductory college level biology courses. Students use a commercial genotyping kit and genetic analyzer or gene sequencer to analyze DNA recovered from a fictitious crime scene. DNA profiling and STR genotyping are outlined. DNA extraction, PCR, and…
Descriptors: Science Laboratories, Persuasive Discourse, Biology, Privacy
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Honawar, Vaishali – Education Week, 2007
Videos of teachers that students taped in secrecy are all over online sites like YouTube and MySpace. Angry teachers, enthusiastic teachers, teachers clowning around, singing, and even dancing are captured, usually with camera phones, for the whole world to see. Some students go so far as to create elaborately edited videos, shot over several…
Descriptors: Internet, Telecommunications, Videotape Recordings, Teacher Rights
Peer reviewed Peer reviewed
Direct linkDirect link
Talab, Rosemary S.; Butler, Rebecca P. – TechTrends: Linking Research and Practice to Improve Learning, 2007
The concept of "publishing" has changed again, just in the last few years, due to YouTube, Blogger, Second Life, Flickr, and other new social networking tools (John Marshall Law School, 2005). Whether they are making it possible for everyone to view a video on YouTube on how to install a hard drive on a Mac, add a collaborative student writing…
Descriptors: Guidelines, Privacy, Copyrights, Internet
Abbott, Stan – 1983
In requesting after action reports--Pentagon-prepared summaries of interviews between reporters and Pentagon officials--investigative reporter Jack Taylor both aroused Pentagon opposition and created a rift between the Pentagon press corps and outside reporters. To investigate whether the full-time Pentagon press corps was reporting as…
Descriptors: Communication (Thought Transfer), Disclosure, Interviews, Journalism
Ross, Rhonda P. – 1982
As part of a symposium on the provision of architectural privacy within the classroom, this paper reviews the limited research that is available and discusses the importance of viewing classroom settings as ecological units with both physical and behavioral components. Whether children prefer to use private facilities, and whether they benefit…
Descriptors: Classroom Design, Classroom Environment, Design Requirements, Ecological Factors
Linowes, David F. – 1981
This paper examines how the U.S. Privacy Protection Commission functioned. Examined are its basic authority, procedures and policies, operational plan, distinctive features, staffing, and results of recommendations. Created by an act of Congress in 1974, the Commission was authorized to examine all actual and potential invasions of privacy in the…
Descriptors: Civil Liberties, Confidential Records, Disclosure, Laws
McKerns, Joseph P. – 1977
The right of privacy versus the public's right to know as protected by the First Amendment is discussed in this paper. A formula is suggested based on Alexander Meiklejohn's interpretation that information about any individual, either a public official or a private person, would be protected as part of the public domain of knowledge if it is…
Descriptors: Civil Liberties, Freedom of Speech, Journalism, News Reporting
Peer reviewed Peer reviewed
Onoda, Lawrence – Personnel and Guidance Journal, 1978
Biofeedback training is a relatively new procedure that is being incorporated into the counseling services of psychologists and counselors. If the highest professional standards and the appropriate safeguards for clients' welfare are to be maintained, careful attention should be given to the ethical and professional issues involved. (Author)
Descriptors: Counseling Services, Counselors, Ethics, Privacy
Pages: 1  |  ...  |  140  |  141  |  142  |  143  |  144  |  145  |  146  |  147  |  148  |  ...  |  227