NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,396 to 1,410 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Laird, Robert D.; Marrero, Matthew D.; Melching, Jessica; Kuhn, Emily S. – Journal of Adolescence, 2013
Studies of privacy invasion have relied on measures that combine items assessing adolescents' feelings of privacy invasion with items assessing parents' monitoring behaviors. Removing items assessing parents' monitoring behaviors may improve the validity of assessments of privacy invasion. Data were collected from 163 adolescents (M age 13 years,…
Descriptors: Validity, Adolescents, Mothers, Privacy
GED Testing Service, 2018
The manual is presented in the form of a policy grid. The grid includes a consolidated list of General Educational Development (GED) Testing Service policies regarding the GED® test and overall GED® program. The grid combines all of the policies into one unified table and supersedes any prior policy manual.
Descriptors: High School Equivalency Programs, Equivalency Tests, Testing Programs, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Marshall, Stephen – Distance Education, 2014
Massive open online courses (MOOCs) represent a potentially exciting opportunity to use technology to realise many of the long-promised benefits of universal higher education. While there are many positive aspects to the MOOCs on offer and in development, there are also significant ethical concerns arising from various initiatives. These include…
Descriptors: Online Courses, Large Group Instruction, Class Size, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
O'Bannon, Blanche; Britt, Virginia; Beard, Jeffrey – Journal of Educational Multimedia and Hypermedia, 2014
This study examined the effectiveness of using a Facebook group to increase preservice teachers' knowledge when one was used as a forum to share, answer, and discuss content-related questions in a technology course required for all students seeking teacher licensure. Further, it examined the students' prior use of Facebook groups, how…
Descriptors: Social Networks, Preservice Teachers, Program Effectiveness, Teacher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dron, Jon; Anderson, Terry – Journal of Interactive Media in Education, 2014
Read/write social technologies enable rich pedagogies that centre on sharing and constructing content but have two notable weaknesses. Firstly, beyond the safe, nurturing environment of closed groups, students participating in more or less public network- or set-oriented communities may be insecure in their knowledge and skills, leading to…
Descriptors: Social Networks, Cooperative Learning, Trust (Psychology), Privacy
Privacy Technical Assistance Center, 2014
Today's classrooms increasingly employ on-demand delivery of personalized content, virtual forums for interacting with other students and teachers, and a wealth of other interactive technologies that help foster and enhance the learning process. Online forums help teachers share lesson plans; social media help students collaborate across…
Descriptors: Privacy, Information Security, Online Systems, Internet
Data Quality Campaign, 2014
District and state data systems are constructed to ensure that individuals can access only the data that are appropriate for their role. Still, questions from the public about how these data systems work and how student privacy is protected have been increasing. A recurring concern is the feared existence of a "permanent record"--a…
Descriptors: Data Collection, Student Records, Data Processing, Access to Information
Wang, Shiyuan – ProQuest LLC, 2012
Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…
Descriptors: Internet, Privacy, Information Services, Technology
Alnatsheh, Rami – ProQuest LLC, 2012
A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…
Descriptors: Data Collection, Data Analysis, Evaluation Methods, Mathematics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dogan, Ugur; Çolak, Tugba Seda – Journal of Education and Training Studies, 2016
This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…
Descriptors: Foreign Countries, High School Students, Privacy, Social Networks
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lovaas, Jessica L. – Global Studies of Childhood, 2016
Young people in the child welfare system are subjected to intensive and wide-ranging observation, surveillance and documentation practices that have been facilitated by the expanding use of digital technologies. Drawing on qualitative research, this article examines the pervasiveness of these governmental practices and their impacts on the…
Descriptors: Foster Care, Child Welfare, Archives, Observation
National Forum on Education Statistics, 2016
The National Forum on Education Statistics (Forum) organized the Education Data Privacy Working Group to explore how state and local education agencies (SEAs and LEAs) can support best practices at the school level to protect the confidentiality of student data in day-to-day instructional and administrative tasks. Many of the best practices…
Descriptors: Privacy, Confidentiality, Case Studies, Risk Management
Goodman, Christie L., Ed. – Intercultural Development Research Association, 2016
Each edition of the IDRA Newsletter strives to provide many different perspectives on the issues in education topics discussed and to define its significance in the state and national dialogue. This issue focuses on Teaching Quality and includes: (1) Fostering Culturally Diverse Learning Environments (Paula Johnson); (2) Unlocking Instruction…
Descriptors: Educational Environment, Culturally Relevant Education, Teaching Methods, Immigrants
Data Quality Campaign, 2016
The Every Student Succeeds Act (ESSA) preserves the most positive legacy of the No Child Left Behind era--more accurate and transparent data about the performance of all students--and helps states take their efforts to use data in support of student learning to the next level. The Data Quality Campaign (DQC) appreciates the opportunity to provide…
Descriptors: Educational Legislation, Federal Legislation, Educational Quality, Quality Assurance
Pages: 1  |  ...  |  90  |  91  |  92  |  93  |  94  |  95  |  96  |  97  |  98  |  ...  |  227