NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,696 to 1,710 of 3,386 results Save | Export
Federal Student Aid, US Department of Education, 2016
This publication is intended for financial aid administrators and counselors who help students begin the aid process--filing the Free Application for Federal Student Aid (FAFSA®), verifying information, and making corrections and other changes to the information reported on the FAFSA. The Federal Student Aid Handbook consists of the Application…
Descriptors: Audits (Verification), Citizenship, College Administration, College Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rodrigo, Russell; Nguyen, Tam – Journal of Learning Design, 2013
This paper presents a qualitative case study of socialised blended learning, using a social network platform to investigate the level of literacies and interactions of students in a blended learning environment of traditional face-to-face design studio and online participatory teaching. Using student and staff feedback, the paper examines the use…
Descriptors: Social Networks, Case Studies, Inclusion, Blended Learning
Office of Safe and Healthy Students, US Department of Education, 2013
Each school day, our nation's schools are entrusted to provide a safe and healthy learning environment for approximately 55 million elementary and secondary school students in public and nonpublic schools. In collaboration with their local government and community partners, schools can take steps to plan for these potential emergencies through the…
Descriptors: Emergency Programs, Planning, Cooperative Planning, Guides
Peer reviewed Peer reviewed
Direct linkDirect link
Magi, Trina J. – College & Research Libraries, 2010
Librarians have a long history of protecting user privacy, but they have done seemingly little to understand or influence the privacy policies of library resource vendors that increasingly collect user information through Web 2.0-style personalization features. After citing evidence that college students value privacy, this study used content…
Descriptors: Privacy, Policy, Content Analysis, Online Vendors
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Descriptors: School Security, Information Technology, Safety, School Personnel
Rethlefsen, Melissa L. – Library Journal, 2010
May 31, 2010, was Quit Facebook Day. But although only around 35,000 of the 500 million Facebook users pledged to quit Facebook on Memorial Day, there's a sense of unease stirring with the social network's strategy. Congress has called for Facebook to explain its stance on the collection and sharing of user information (see…
Descriptors: Marketing, Social Networks, Internet, Librarians
Davis, Michelle R. – Education Digest: Essential Readings Condensed for Quick Review, 2010
Just a few years ago, social networking meant little more to educators than the headache of determining whether to penalize students for inappropriate activities captured on Facebook or MySpace. Now, teachers and students have an array of social-networking sites and tools--from Ning to VoiceThread and Second Life--to draw on for such serious uses…
Descriptors: Elementary Secondary Education, Social Networks, Computer Uses in Education, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Strehlke, Christina – Journal of Employment Counseling, 2010
This action research study explores the career influence of social network sites (SNSs) by examining 14 web-based articles that consider the risks and opportunities of SNSs from a job search perspective. Three themes are discussed: user visibility, self-presentation, and network connections. Practical strategies are identified to help career…
Descriptors: Action Research, Privacy, Social Networks, Internet
McGuinn, Patrick – Phi Delta Kappan, 2015
People dislike the Common Core for several different reasons, and so it is important to disaggregate the sources of opposition and to assess and then to dispel some of the myths that have built up around it. It also is important to understand the unusual political alliances that have emerged in opposition to Common Core implementation and how they…
Descriptors: State Standards, Educational Policy, Educational Change, Public Opinion
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stephan, Karl D. – American Journal of Engineering Education, 2012
Authority as a philosophical concept is defined both in general and as it applies to engineering education. Authority is shown to be a good and necessary part of social structures, in contrast to some cultural trends that regard it as an unnecessary and outmoded evil. Technical, educational, and organizational authority in their normal functions…
Descriptors: Engineering Education, Power Structure, Philosophy, Teacher Role
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis
Foss, Nathan D. – ProQuest LLC, 2012
The purpose of this qualitative research study was to identify commonly held beliefs and perceived experiences of preservice and early service teachers with regard to their use of the social networking site Facebook. This study included recorded and transcribed interviews of 14 participants as well as observations of their Facebook accounts. The…
Descriptors: Beliefs, Learning Experience, Preservice Teachers, Beginning Teachers
Patterson, Olga – ProQuest LLC, 2012
Domain adaptation of natural language processing systems is challenging because it requires human expertise. While manual effort is effective in creating a high quality knowledge base, it is expensive and time consuming. Clinical text adds another layer of complexity to the task due to privacy and confidentiality restrictions that hinder the…
Descriptors: Language Processing, Syntax, Semantics, Government Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Zakar, Rubeena; Zakar, Muhammad Zakria; Kramer, Alexander – Journal of Interpersonal Violence, 2012
This article documents the coping strategies adopted by women victims of spousal violence in Pakistan. By drawing on 21 in-depth interviews conducted in Lahore and Sialkot (Pakistan), we found that the women tried to cope with violence by using various strategies, both emotion focused (e.g., use of religion, placating the husband, etc.) and…
Descriptors: Social Problems, Social Change, Females, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Foltz, Robert – Reclaiming Children and Youth, 2011
A parent's goal is to be sure each teen stays safe, makes responsible decisions, and respects others. But the influence of peers, the temptation of freedom, access to alcohol and other drugs, and unsupervised activities cause parents to fear that their teen may be ill-equipped to negotiate the complicated world. The transition from dependence to…
Descriptors: Privacy, Adolescents, Social Networks, Telecommunications
Pages: 1  |  ...  |  110  |  111  |  112  |  113  |  114  |  115  |  116  |  117  |  118  |  ...  |  226