NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,771 to 1,785 of 3,386 results Save | Export
Vuong, Bi – Pathways to College Network, 2011
As policymakers consider strategies to increase college completion and further economic growth, it is critical that statewide longitudinal data systems be viewed as a necessary tool. This report highlights the role of data systems in improving the completion of postsecondary education, and provides recommendations and tangible examples for…
Descriptors: Postsecondary Education, Graduation, College Graduates, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zucker, Andrew A. – Education Policy Analysis Archives, 2011
After the attacks of 9/11/2001 the federal government implemented new policies intended to protect people and institutions in the United States. A surprising policy requires education researchers conducting research under contract to the U.S. Department of Education (ED) to obtain security clearances, sometimes known as security screenings.…
Descriptors: Educational Research, Federal Government, Federal Regulation, Personnel Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Nodulman, Jessica A. – Communication Teacher, 2011
This article presents an activity that combines this popular website, Postsecret.com, with college students' love for the internet, and course content on privacy boundaries and theory, disclosure, communicative control, and privacy rule development. By taking part in this activity, students practice privacy disclosure and are able to examine their…
Descriptors: College Students, Web Sites, Reputation, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Reid, Pamela Trotman; Cole, Ellen; Kern, Margaret L. – Psychology of Women Quarterly, 2011
How does a modern woman react to being defined by the role of wife? In our study, the authors examined the experiences, benefits, and challenges encountered by wives of college and university presidents. In a relationship where the husband has a prestigious and well-defined role, the female partner may still be expected to play a traditional role…
Descriptors: Spouses, Females, Focus Groups, Figurative Language
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Li, Fengjun – ProQuest LLC, 2010
As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…
Descriptors: Information Security, Databases, Institutional Cooperation, Privacy
Adebiaye, Richmond – ProQuest LLC, 2010
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
Descriptors: Computer Mediated Communication, Electronic Mail, Privacy, Social Networks
Schwartz, Harriet L. – Education Digest: Essential Readings Condensed for Quick Review, 2010
There has been much discussion about the issue of boundaries on Facebook. Some suggest faculty members can resolve potential dilemmas in relation to students by making sensible decisions about what to post and by fine-tuning privacy settings. But the challenges and opportunities run deeper. For those who want to be appropriately accessible to…
Descriptors: Electronic Mail, Social Networks, Computer Mediated Communication, Web Sites
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Emmeline – Journal of Education Policy, 2011
The use of CCTV in schools is now commonplace in the UK. It is estimated that 85% of all UK secondary schools currently have CCTV systems in operation. The introduction of the Data Protection Act 1998 (DPA) (enacted in March 2000) meant that for the first time CCTV had direct legislation governing its use in the UK. This paper attempts to apply…
Descriptors: Foreign Countries, School Safety, Safety Equipment, Law Enforcement
Willard, Nancy – Corwin, 2012
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Descriptors: Child Safety, Computers, Internet, Secondary School Students
Steinberg, Sarah E. – ProQuest LLC, 2012
This two-phase study determined the landscape and intent of medical school peer mentoring programs in the U.S., U.S. Territories and Canada and, as far as can be determined, is the first of its kind. Insights from established peer mentoring programs, discovered by exploring their purpose, design, evaluations and outcomes, formed the evidence-based…
Descriptors: Foreign Countries, Medical Education, Medical Schools, Medical School Faculty
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Phillippo, Kate – Urban Review: Issues and Ideas in Public Education, 2012
Urban school districts have increasingly enacted policies of personalism, such as converting large schools into smaller schools. Such policies ask teachers to develop supportive, individual relationships with students as a presumed lever for student achievement. Research on student-teacher relationships generally supports policies of personalism.…
Descriptors: Urban Schools, School Districts, Teacher Student Relationship, Educational Policy
Pages: 1  |  ...  |  115  |  116  |  117  |  118  |  119  |  120  |  121  |  122  |  123  |  ...  |  226