Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jameson, Daphne A. – Business and Professional Communication Quarterly, 2014
When Chiquita Brands considered relocating its corporate headquarters, competing cities started Twitter campaigns to influence the decision by communicating directly with the chief executive officer. As he used the new microblogging channel, some of his previously private communication became public, some personal communication became…
Descriptors: Business Communication, Communication Strategies, Social Networks, Web 2.0 Technologies
Page, Xinru Woo – ProQuest LLC, 2014
This work aims to understand real-world factors shaping behaviors and attitudes towards location-sharing social networks (LSSN), especially as to why people avoid or abandon this technology, or limit their usage. Based on interview-based qualitative research and survey-based exploratory quantitative research, I hypothesize conceptual models…
Descriptors: Social Media, Mass Media Use, Geographic Location, Information Dissemination
Flor, Alexander Gonzalez – Open Praxis, 2013
The paper is based on the challenges encountered by the researcher while conducting a study titled "Design, Development and Testing of an Indigenous Knowledge Management System Using Mobile Device Video Capture and Web 2.0 Protocols." During the conduct of the study the researcher observed a marked reluctance from organized indigenous…
Descriptors: Open Source Technology, Educational Resources, Indigenous Knowledge, Educational Practices
Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan – Interdisciplinary Journal of E-Learning and Learning Objects, 2013
The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…
Descriptors: Social Networks, Privacy, Technology Uses in Education, Role Theory
Venables, Anne; Tan, Grace; Miliszewska, Iwona – Journal of Information Technology Education: Innovations in Practice, 2013
To succeed within the increasingly global context of their work environment, today's IT professional needs to be equipped with both cutting-edge technical skills and a strong repertoire of "soft" skills. An important and often unrecognized soft skill is an appreciation of how various IT issues impact upon different peoples and what…
Descriptors: Foreign Countries, Cultural Awareness, Information Technology, Computer Science Education
Schrodt, Paul – Communication Education, 2013
Using Petronio's communication privacy management theory, this study tested the degree to which content relevance and students' comfort with instructor disclosures moderated the association between instructor disclosures (i.e., frequency and appropriateness) and credibility (i.e., competence, trustworthiness, and goodwill) in the college…
Descriptors: Privacy, College Faculty, Credibility, Self Disclosure (Individuals)
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Cibangu, Sylvain K. – Information Research: An International Electronic Journal, 2013
Introduction: Just as we have created them, the new social media technologies have shaped every aspect of our societies. Meanwhile, information science has hardly addressed the ways in which these information technologies have shaped humans, and vice-versa. The major reason is the tendency and pressure to adjust (the needs of) humans to the ever…
Descriptors: Information Science, Information Science Education, Information Technology, Relevance (Education)
Binder, Perry; Mansfield, Nancy R. – Journal of Legal Studies Education, 2013
The explosion of social networks and the growing concern over privacy in the digital age--both in the United States and Europe--have provided an opportunity to introduce students to the legal risks of using social media in the workplace. This article builds on the authors' classroom experiences and provides social media scenarios and projects that…
Descriptors: Business Administration Education, Law Related Education, Social Networks, Web Sites
McGill, Shelley – Journal of Legal Studies Education, 2013
Aaron Sorkin has a passion for words--his signature movie and television scripts are fast talking, jargon laced, word pictures that are instantly recognizable. "The Social Network," Sorkin's 2011 Academy Award Winning movie about the founding of Facebook, Inc., offers more than just witty banter; it provides an ideal teaching platform for…
Descriptors: Business Administration Education, Law Related Education, Undergraduate Students, Films
National Forum on Education Statistics, 2011
This document, "Book Three of Four: Effectively Managing LDS Data," is the third installment of this Forum series of guides on longitudinal data systems (LDS). This third book in the guide series discusses organizational issues aimed at moving the project forward and ensuring that the data are of high quality so that users may leverage…
Descriptors: Information Systems, Information Management, Data, Organization
Data Quality Campaign, 2011
As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…
Descriptors: State Policy, Data Collection, Databases, Student Records
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Mulholland, Jessica – Education Digest: Essential Readings Condensed for Quick Review, 2012
In New York's Port Washington Union Free School District, security and privacy for students, faculty, and staff coexist--thanks to security cameras with eyelids. In 2010, video cameras donated by New York-based SituCon Systems were installed in the main lobby at two of the district's seven schools. "We really haven't had the kind of incidents…
Descriptors: School Security, Video Technology, Photography, Technology Uses in Education
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases

Peer reviewed
Direct link
