NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,951 to 1,965 of 3,386 results Save | Export
Data Quality Campaign, 2011
Statewide Longitudinal Data Systems (SLDS) provide the information and tools needed to inform policies, practices and decisions at every level to improve student achievement and system performance. It is equally important that there are policies and practices to protect personally identifiable information and to ensure the confidentiality and…
Descriptors: State Agencies, Student Records, Privacy, Information Security
Wells, Cris – ProQuest LLC, 2010
Throughout history human subject research has been plagued by researchers whose studies were riddled with danger and/or risk to their subjects. Indeed, one may cite numerous situations where human subjects were injured and/or killed in experiments that were designed with no thought or anticipation of risk to the subjects. As a result, the federal…
Descriptors: Patients, Research, Participant Characteristics, Experimental Groups
Peer reviewed Peer reviewed
Direct linkDirect link
Junco, Reynol; Chickering, Arthur W. – About Campus, 2010
For centuries, issues of civil discourse only arose concerning written and oral communication. But now, new technologies for communication and social interaction, particularly social media, have dramatically expanded the potential for human interaction. They generate significant challenges for institutional policies and practices to encourage and…
Descriptors: Interpersonal Relationship, Opportunities, Interaction, Technological Advancement
Rikleen, Lauren Stiller – Chronicle of Higher Education, 2007
The recent events at Virginia Tech reinforce the idea that nothing is more fundamental for college leaders to address than campus security and safety. After the tears, the makeshift memorials, and the intensely painful series of funerals, higher education must come to grips with the fact that it has just had its own September 11. Assessing and…
Descriptors: School Security, Privacy, School Safety, Crime Prevention
Ostrowsky, Ben – Computers in Libraries, 2005
Like the Lone Ranger's mask, a good information retention policy can safeguard personal identity information. Librarians want to be sure that patrons will return what they borrow, and they want statistics that quantify the library's value to its community. Librarians also want to protect customers' privacy; they usually don't keep personally…
Descriptors: Privacy, Library Services
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gaither, Milton – Educational Horizons, 2008
The author discusses his book "Homeschool: An American History," and offers four primary impetuses for the current status of homeschooling as a political movement. First, he writes, social and political changes of the second half of the twentieth century partnered radical leftists who wanted nothing to do with conventional America and conventional…
Descriptors: Home Schooling, Privacy, Social Change, Political Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Ji, Yuanhong; Ramirez, Sylvia Z.; Kranz, Peter L. – Journal of Instructional Psychology, 2008
This article describes a number of important issues to consider in play therapy with Japanese children. They include the waiting room and playroom decor, toys, and other materials, as well as terminology that are commonly used in Japan. The layout of the small and large playrooms, use of the "Wa-Shitsu" (a traditional Japanese room…
Descriptors: Play, Children, Foreign Countries, Play Therapy
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Tufekci, Zeynep – Bulletin of Science, Technology & Society, 2008
The prevailing paradigm in Internet privacy literature, treating privacy within a context merely of rights and violations, is inadequate for studying the Internet as a social realm. Following Goffman on self-presentation and Altman's theorizing of privacy as an optimization between competing pressures for disclosure and withdrawal, the author…
Descriptors: Audiences, Profiles, Social Networks, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Torres, Mario S., Jr.; Callahan, Jamie L. – Education and Urban Society, 2008
This study explores the court system's treatment of students' Fourth Amendment rights in cases emerging from contrasting minority school settings and whether discrepancies exist in case outcomes between these extremes. From virtually every search and seizure case that occurred between the 1985 U.S. Supreme Court case in "New Jersey v.…
Descriptors: Courts, Search and Seizure, Court Litigation, Psychological Patterns
Taylor, Kelley R. – Principal Leadership, 2008
In fall 2007, the American Civil Liberties Union (ACLU) of Colorado accused Colorado school officials of committing felonies and violating students' privacy rights. The controversy stemmed from allegations that a high school assistant principal read and transcribed text messages from a cell phone that school officials had taken away from a…
Descriptors: Privacy, Telecommunications, School Policy, Civil Rights
Sander, Libby – Chronicle of Higher Education, 2008
A software program that searches for offensive content on college athletes' social-networking sites has drawn skeptical reactions from legal experts, who say it could threaten students' constitutional rights. Billed as a "social-network monitoring service" and marketed exclusively to college athletics departments, YouDiligence was on display at…
Descriptors: College Athletics, Athletes, Social Networks, Web Sites
Federal Student Aid, US Department of Education, 2012
This publication is intended for financial aid administrators and counselors who help students begin the aid process--filing the Free Application for Federal Student Aid (FAFSA), verifying information, and making corrections and other changes to the information reported on the FAFSA. The Federal Student Aid Handbook consists of the Application and…
Descriptors: Student Financial Aid, Federal Aid, Student Loan Programs, Grants
Peer reviewed Peer reviewed
Direct linkDirect link
Dyckhoff, Anna Lea; Zielke, Dennis; Bultmann, Mareike; Chatti, Mohamed Amine; Schroeder, Ulrik – Educational Technology & Society, 2012
Learning Analytics can provide powerful tools for teachers in order to support them in the iterative process of improving the effectiveness of their courses and to collaterally enhance their students' performance. In this paper, we present the theoretical background, design, implementation, and evaluation details of eLAT, a Learning Analytics…
Descriptors: Foreign Countries, Computer Uses in Education, Semi Structured Interviews, Usability
Lenhart, Amanda; Madden, Mary; Smith, Aaron; Purcell, Kristen; Zickuhr, Kathryn; Rainie, Lee – Pew Internet & American Life Project, 2011
Social media use has become so pervasive in the lives of American teens that having a presence on a social network site is almost synonymous with being online. Fully 95% of all teens ages 12-17 are now online and 80% of those online teens are users of social media sites. The authors focused their attention in this research on social network sites…
Descriptors: Altruism, Internet, Citizenship, Social Networks
Pages: 1  |  ...  |  127  |  128  |  129  |  130  |  131  |  132  |  133  |  134  |  135  |  ...  |  226