Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lundgren, Henriette; Kroon, Brigitte; Poell, Rob F. – European Journal of Training and Development, 2017
Purpose: The purpose of this paper is to explore how and why personality tests are used in workplace training. This research paper is guided by three research questions that inquire about the role of external and internal stakeholders, the value of psychometric and practical considerations in test selection, and the purpose of personality test use…
Descriptors: Workplace Learning, Human Resources, Foreign Countries, Personality Measures
Schmidt, Merete – Australian and International Journal of Rural Education, 2017
This paper provides an in-depth analysis of a group of young rural men's and women's understandings of 'the city' and 'the country', and the relationship between this and their educational decision making. The analysis adds to a growing body of literature on young rural people's experiences and the emerging research on education in a rural…
Descriptors: Foreign Countries, High School Students, Student Attitudes, Rural Areas
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Barnes, Melissa – Australian Journal of Applied Linguistics, 2019
There is increasing interest in how educational technologies can be used to promote and create meaningful learning opportunities and, more specifically, how social media tools can be harnessed to encourage language learning through online interactions. Educational social media tools, however, thrust student learning from a private space into a…
Descriptors: Social Media, Social Capital, Self Concept, High School Students
Jørgensen, Thomas – European University Association, 2019
The digital transformation of our societies is moving ahead, changing the way that we work and interact. It is also changing learning environments and the need for digital skills. This paper argues for a differentiated approach by universities to digital skills, identifying three groups of learners: (1) ICT [Information and Communication…
Descriptors: Universities, Technological Literacy, Information Technology, Specialists
Kitano, Chika; Mills, Daniel; Kohyama, Megumi – Research-publishing.net, 2019
This chapter describes an inquiry into how Japanese university students who have participated in study-abroad negotiate their identity on Social Networking Sites (SNSs) when interacting informally in English with non-Japanese interlocutors. SNSs provide a unique opportunity for English language learners to practise their skills in an informal…
Descriptors: Study Abroad, Social Networks, College Students, English (Second Language)
Perry, Angela – Project on Student Debt, 2019
California has long been a national and global leader in developing and maintaining quality higher education options, as well as in providing financial aid and consumer protections for Californians who access that education. However, although California's colleges and the state government do collect, receive, and report a great deal of data, these…
Descriptors: Education Work Relationship, Access to Information, Wages, Data Collection
Sullivan, Amanda L.; Nguyen, Thuy; Weeks, Mollie R.; Kulkarni, Tara – Equity Assistance Center Region III, Midwest and Plains Equity Assistance Center, 2019
To help families navigate these processes, this tool is intended to introduce students and families to their rights in common scenarios, promote educational equity for students with disabilities, describe potential recourse or remedies for educational discrimination, and provide resources to enhance equity within schools. Families' rights and…
Descriptors: Civil Rights, Students with Disabilities, Student Rights, Equal Education
Martin, Florence; Wang, Chuang; Petty, Teresa; Wang, Weichao; Wilkins, Patti – Educational Technology & Society, 2018
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and "bring your own technology" initiatives, attention to these topics is becoming increasingly important. A total of 593…
Descriptors: Middle School Students, Social Media, Student Surveys, Bullying
Rapp, Marisa C.; Moody, Steven J.; Stewart, Leslie A. – Professional Counselor, 2018
The Council for Accreditation of Counseling & Related Educational Programs (CACREP) standards call for doctoral preparation programs to graduate students who are competent in gatekeeping functions. Despite these standards, little is understood regarding the development and training of doctoral students in their roles as gatekeepers. We propose…
Descriptors: Graduate Students, Counselor Training, Selective Admission, Student Role
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Alghamdi, Osamah Mohammed – ProQuest LLC, 2018
Online learning has the potential to expand collaborative learning and teaching. It has tremendous potential in the educational field, as it allows people to access computing services to share and edit data over the Internet. Yet few studies investigate the growing impacts of online learning on students' learning skills, such as collaborative…
Descriptors: Foreign Countries, Online Courses, Educational Technology, Technology Uses in Education
Hopkyns, Sarah – Policy Futures in Education, 2022
The ongoing global COVID-19 pandemic has caused unprecedented shifts in higher education worldwide, with some nations more adversely affected than others. Since the onset of the crisis, almost all education abruptly moved to 'emergency remote teaching and learning'. While the United Arab Emirates has been praised for its swift and effective…
Descriptors: Online Courses, COVID-19, Religious Factors, Foreign Countries
Shen, Entong – ProQuest LLC, 2013
In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…
Descriptors: Privacy, Data, Data Collection, Syntax

Peer reviewed
Direct link
