Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lawrence, Cameron; Firth, David; Khumalo, Floyd – Information Systems Education Journal, 2013
Information Technology has transformed almost all aspects of modern healthcare and is playing a vital role in the administration of hospitals around the world. This case study examines one hospital's struggle to solve crucial operational problems related to the efficient management of medical equipment inventory. This case study is the result of…
Descriptors: Outsourcing, Case Studies, Hospitals, Information Technology
Stockley, Denise; Balkwill, Laura-Lee – Canadian Journal for the Scholarship of Teaching and Learning, 2013
Does the subject of research ethics take you by surprise? Does it make you somewhat uncomfortable? Does it seem to have nothing to do with your research or your practice? These are the attitudes we have encountered about research ethics among some SoTL researchers at workshops and conferences. In many cases, these researchers had conducted…
Descriptors: Consciousness Raising, Ethics, Educational Research, Educational Development
Hohnle, Steffen; Michel, Boris; Glasze, Georg; Uphues, Rainer – International Research in Geographical and Environmental Education, 2013
Young people in modern societies consciously (e.g. Facebook) or unconsciously (e.g. some Google services) produce a vast amount of geodata. Using relational databases, private companies are capable of creating very precise profiles of the individual user and his/her spatial practices from this data. This almost inevitably prompts questions…
Descriptors: Information Security, Geography, Privacy, Geography Instruction
Lennon, Sean M. – Educational Forum, 2013
Online social networks such as Facebook have changed the context and definitions of socialization. Focusing on teacher use, this article considers the size and impact of these forums and the importance many young professionals feel toward them. Themed as a common sense approach, the author uses anecdotal points and discussions with…
Descriptors: Social Networks, Educational Technology, Computer Uses in Education, Technology Integration
Maar, Michael C. – ProQuest LLC, 2013
This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…
Descriptors: Social Networks, Information Security, Privacy, Motivation
Partnership for Assessment of Readiness for College and Careers, 2013
The Partnership for Assessment of Readiness of College and Careers ("PARCC") is a non-profit consortium of states that have organized themselves to develop new assessment systems that measure student knowledge and skills against a common set of college- and career-ready standards in mathematics and English language arts in a way that…
Descriptors: Student Records, Privacy, Confidentiality, Information Management
Albert, Daniel J. – Music Educators Journal, 2015
Students in the United States use technology and social media platforms for both educational and noneducational purposes. Integration of social media in music education classes can help facilitate learning experiences that would be less likely to happen in a brick-and-mortar setting. However, issues such as privacy and cyberbullying continue to…
Descriptors: Social Media, Music Education, Teaching Methods, Educational Technology
Gagnon, Joseph C.; Read, Nicholas W.; Gonsoulin, Simon – National Technical Assistance Center for the Education of Neglected or Delinquent Children and Youth (NDTAC), 2015
Access to high-quality education for youth is critical to their long-term success as adults. Youth in juvenile justice secure care facilities, however, too often do not have access to the high-quality education and related supports and services that they need, particularly youth with disabilities residing in such facilities. This brief discusses…
Descriptors: Access to Education, Educational Quality, Juvenile Justice, Institutionalized Persons
Vance, Amelia – State Education Standard, 2016
Oklahoma's Student Data Accessibility, Transparency, and Accountability Act (known as the Student DATA Act) arose just as privacy concerns about student data were beginning to surface. According to Linnette Attai, founder of education technology compliance consultancy PlayWell LLC, "When this climate of data privacy first emerged in its…
Descriptors: Student Records, Information Security, Privacy, Laws
Ramsey, David; Evans, Jocelyn; Levy, Meyer – Journal of Political Science Education, 2016
This article presents a new approach to online graduate education. With hopes of recruiting a larger cohort in order to preserve a graduate program struggling with low enrollment, we began offering a limited number of seats to students who would attend class in real time but from remote locations, using a videoconferencing platform. Unlike…
Descriptors: Seminars, Graduate Study, Online Courses, Graduate Students
Cardichon, Jessica; Bradley, Sean – Alliance for Excellent Education, 2016
States are responsible for setting the minimum number of students needed to form a student subgroup for federal reporting and accountability purposes. This required student subgroup size is commonly referred to as the state-set "n-size." States should set this number as low as possible to maximize the number of student subgroups created.…
Descriptors: Educational Legislation, Federal Legislation, Elementary Secondary Education, Accountability
Bossaller, Jenny; Kammer, Jenna – College Teaching, 2014
eTextbooks are both texts and tools. They provide opportunities for textbook companies to expand their services. Some large textbook companies are offering extensive educational technology products and services along with texts. These etexts, integrated into the Learning Management System (LMS), give instructors opportunities to use integrated…
Descriptors: Textbooks, Electronic Publishing, Integrated Learning Systems, Educational Assessment
Center for IDEA Early Childhood Data Systems (DaSy), 2014
This 2014 document is intended to assist early intervention service programs and providers and preschool special education programs and agencies in maintaining compliance with privacy and confidentiality requirements under IDEA [Individuals with Disabilities Education Act] and FERPA [Family Educational Rights and Privacy Act]. It reviews the…
Descriptors: Early Intervention, Preschool Education, Special Education, Compliance (Legal)
Drill, Sabrina L. – Journal of Extension, 2012
Considerations and tools for developing mobile applications for Extension include evaluating the topic, purpose, and audience. Different computing platforms may be used, and apps designed as modified Web pages or implicitly programmed for a particular platform. User privacy is another important consideration, especially for data collection apps.…
Descriptors: Extension Education, Telecommunications, Handheld Devices, Technology Uses in Education
Guerry, Richard – Education Digest: Essential Readings Condensed for Quick Review, 2012
Most discussions about keeping kids safe online center around two issues: (1) With the rapid development and dissemination of digital technology, how can we stay ahead of what our students are doing?; and (2) What controls are available to prevent students from visiting inappropriate sites? These are reasonable questions, but they ignore two…
Descriptors: Internet, Accountability, Bullying, Computers

Peer reviewed
Direct link
