NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,891 to 1,905 of 3,386 results Save | Export
Data Quality Campaign, 2012
While states have made tremendous progress building the capacity to collect longitudinal data, developing the systems and practices to tap into P-20W data remains a nascent effort in most states. This primer aims to provide policymakers with information and recommendations to propel states' progress toward using P-20W data to prepare…
Descriptors: Information Dissemination, Knowledge Economy, State Policy, Information Systems
Hussain, Fehmida – International Association for Development of the Information Society, 2012
Web 3.0, termed as the semantic web or the web of data is the transformed version of Web 2.0 with technologies and functionalities such as intelligent collaborative filtering, cloud computing, big data, linked data, openness, interoperability and smart mobility. If Web 2.0 is about social networking and mass collaboration between the creator and…
Descriptors: Foreign Countries, Electronic Learning, Learning Theories, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Childs, Mark; Schnieders, H. Lori; Williams, Gweno – Interactive Learning Environments, 2012
Using virtual worlds as media for learning and teaching gives rise to the potential for many unique ethical problems. Some of these arise due to the nature of the engagement with these virtual worlds, in which the students create a virtual representation, called an avatar, which may enable a sense of embodiment, and hence exposure, within the…
Descriptors: Foreign Countries, Educational Opportunities, Simulated Environment, Self Concept
Peer reviewed Peer reviewed
Direct linkDirect link
Francis-Poscente, Krista; Moisey, Susan Darlene – Journal of Distance Education, 2012
This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…
Descriptors: Foreign Countries, Educational Technology, Web Based Instruction, Electronic Learning
National Forum on Education Statistics, 2013
This document is intended to serve as a practical guide for implementing a teacher-student data link (TSDL) that supports a range of uses at the local, regional, and state levels. The guide addresses the considerations for linking teacher and student data from multiple perspectives, including governance, policies, data components, business rules,…
Descriptors: Data Collection, Data Analysis, Educational Research, Research Utilization
Office of Elementary and Secondary Education, US Department of Education, 2013
This guidance is written to assist State educational agencies (SEAs) and local educational agencies (LEAs) in understanding and implementing the report card requirements under Title I, Part A of the Elementary and Secondary Education Act of 1965, as amended (ESEA). Although each SEA and LEA may consider this guidance in developing and…
Descriptors: Federal Legislation, Educational Legislation, Elementary Secondary Education, State Departments of Education
Bishop, Cheryl Ann – ProQuest LLC, 2009
Currently there exists a global movement promoting institutional transparency and freedom of information legislation. Conceptualizing access to government-held information as a human right is one of the latest developments in this global trend promoting access to information. The purpose of this dissertation is to identify and analyze the various…
Descriptors: Civil Rights, Freedom of Speech, Access to Information, Nongovernmental Organizations
Beckner, Gary, Ed. – Association of American Educators Foundation, 2009
"Education Matters" is the monthly newsletter of the Association of American Educators (AAE), an organization dedicated to advancing the American teaching profession through personal growth, professional development, teacher advocacy and protection. This issue of the newsletter includes: (1) Invading Privacy: Card Check is on the Way! (Hans…
Descriptors: Newspapers, Teaching Methods, Teacher Associations, Self Esteem
Peer reviewed Peer reviewed
Direct linkDirect link
Thur, Victoria L. – Journal of Access Services, 2009
The U.S. government has sought to restrict the freedoms of its citizens in times of war from World War I to the present. The banners of fear, war, terrorism, and nationwide security placed constitutional rights under a renewed scrutiny. This paper will focus on the passage of laws that restrict academic and intellectual freedoms during war, and…
Descriptors: Intellectual Freedom, Access to Information, National Security, Academic Freedom
Young, Jeffrey R. – Chronicle of Higher Education, 2009
Recording class sessions so students can view them online is becoming routine on many campuses. But all that taping can lead to "uh-oh moments," such as when a professor's joke about the college dean ends up on YouTube, or a private comment to a student after class is inadvertently broadcast. Some lecture bloopers caught on tape are…
Descriptors: College Faculty, Course Content, Nonprint Media, Lecture Method
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Sarah; Hannah, Andrew; Stones, Dave; Morley, Robert – College and University, 2011
Electronic transcripts are no longer a concept awaiting definition. They are here to stay. Although paper transcripts remain the standard--at least in terms of volume--an ever-increasing number and eventual majority of students and alumni will expect if not require electronic transcripts. College registrars and admissions officers' obligation to…
Descriptors: Postsecondary Education, College Administration, Registrars (School), Admissions Officers
Data Quality Campaign, 2008
Data are only useful if people are able to access, understand and use them. Without access to the right information, stakeholders are forced to make decisions based on anecdote, experience or instinct. For information to be useful, it must be timely, readily available, and easy to understand. Different stakeholders need and are entitled to access…
Descriptors: Access to Information, Stakeholders, Privacy, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Gow, Gordon A.; Parisi, Jennifer – Bulletin of Science, Technology & Society, 2008
In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…
Descriptors: National Security, Privacy, Law Enforcement, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Peekhaus, Wilhelm – Bulletin of Science, Technology & Society, 2008
This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational…
Descriptors: Economic Progress, Medical Research, Privacy, Biotechnology
Peer reviewed Peer reviewed
Direct linkDirect link
Davies, Gordon K. – Change: The Magazine of Higher Learning, 2008
The shootings that took place last spring on the campus of Virginia Polytechnic Institute and State University, located in Blacksburg, Virginia, elicited a host of reactions, many deeply emotional. In groups of college and university presidents, the response was generally empathetic. Indeed, they were right to be put on alert by the random and…
Descriptors: Health Services, Police, Gun Control, School Security
Pages: 1  |  ...  |  123  |  124  |  125  |  126  |  127  |  128  |  129  |  130  |  131  |  ...  |  226