NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,996 to 2,010 of 3,386 results Save | Export
Ross, Ruth Herron; Roberts-Pacchione, Beth – Corwin, 2011
Research shows that a child's social and behavioral skills affect the development of cognitive and physical abilities. Set students on a path to success and have fun doing it with this activity-packed second edition of "Wanna Play". The authors provide hundreds of activities that help children learn how to behave appropriately and make friends.…
Descriptors: Direct Instruction, Behavior Problems, Early Intervention, Interpersonal Relationship
National Archives and Records Administration, 2008
The Secretary amends our regulations implementing the Family Educational Rights and Privacy Act (FERPA), which is section 444 of the General Education Provisions Act. These amendments are needed to implement a provision of the USA Patriot Act and the Campus Sex Crimes Prevention Act, which added new exceptions permitting the disclosure of …
Descriptors: Federal Regulation, Privacy, Educational Legislation, Federal Legislation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Subrahmanyam, Kaveri; Greenfield, Patricia – Future of Children, 2008
Over the past decade, technology has become increasingly important in the lives of adolescents. As a group, adolescents are heavy users of newer electronic communication forms such as instant messaging, e-mail, and text messaging, as well as communication-oriented Internet sites such as blogs, social networking, and sites for sharing photos and…
Descriptors: Internet, Adolescents, Interpersonal Relationship, Anxiety
Quinn-Lee, Lisa – ProQuest LLC, 2009
A review of the literature reveals few articles that deal with social work with grieving children in the public school setting. The purpose of this research is to describe and analyze the services that school social workers provide to grieving children. Grieving children are defined as those who have experienced loss through death of someone…
Descriptors: Siblings, Parents, Grandparents, Friendship
Smith, Robert B.; Fleming, Dana L. – Chronicle of Higher Education, 2007
Virginia recently became the first state to pass legislation that bars public colleges and universities from punishing or expelling students "solely for attempting to commit suicide, or seeking mental-health treatment for suicidal thoughts or behaviors." While well intentioned, the law adds nothing to current law and will, in fact, make…
Descriptors: Colleges, Legal Responsibility, Suicide, College Students
Fischer, Karin; Wilson, Robin – Chronicle of Higher Education, 2007
This article reports on the findings of the state panel on the Virginia Tech massacre. A state panel that investigated last spring's massacre at Virginia Tech has issued a harshly worded report that says the university erred in the way it handled a mentally disabled student who became a killer and in how it dealt with the immediate aftermath of…
Descriptors: Reports, School Security, Crisis Management, College Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
VanFossen, Phillip J.; Berson, Michael J. – Contemporary Issues in Technology and Teacher Education (CITE Journal), 2008
Young people today consume large amounts of information through various media outlets and simultaneously create and distribute their own messages via information and communication technologies and massively multiplayer online gaming. In doing so, these "digital natives" are often exposed to violent, racist, or other deleterious messages.…
Descriptors: Social Studies, Teaching Methods, Information Technology, Critical Literacy
Conger, Sharmila Basu – State Higher Education Executive Officers, 2008
Student achievement depends upon successful passage through a series of transitions: elementary to middle school, middle school to high school, high school to college. Increasing the efficiency of successful transitions requires the collection and analysis of student data across these transition points. Yet long-standing separations between…
Descriptors: Data, State Programs, Information Systems, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Seock, Yoo-Kyoung; Norton, Marjorie J. T. – College Student Journal, 2008
The purpose of this study was to examine perceptions of attributes of clothing retailers' Internet websites in relation to previous and intended future purchase from the websites. Survey data from 414 U.S. college students, non-married and aged 18-22 with online clothing shopping experience and favorite clothing websites were used. Five clothing…
Descriptors: College Students, Merchandise Information, Consumer Education, Factor Analysis
Peer reviewed Peer reviewed
Maisonrouge, J. G. – Information Society, 1981
Describes the current status of developments concerning the regulation of information flow across national borders. Similarities and trends in various privacy laws from European countries are discussed, as are the business position on data protection and efforts to harmonize national laws. (SW)
Descriptors: Information Processing, International Relations, Laws, Privacy
Peer reviewed Peer reviewed
Hample, Dale – Argumentation and Advocacy, 1988
Asks whether different kinds of arguments are essentially similar or different. Considers three kinds of argument as potentially the primary argument. Rejects each, concluding that these kinds of argument are fundamentally similar. Focuses on the ideas of publicness, sociality, and cognition, assuming these to be the main possibilities for…
Descriptors: Discourse Analysis, Persuasive Discourse, Privacy, Rhetoric
Peer reviewed Peer reviewed
Martin, Kelly – T.H.E. Journal, 2004
It used to be that Internet threats were aimed at disabling their targets. The most common payload of yesterday's viruses, worms and other malicious code either caused system instability or, perhaps, deleted certain files. In many cases, these threats announced their arrival by flashing messages on the computer screen or causing some other…
Descriptors: Computer Security, Computer Software, Privacy, Internet
James, Nalita; Busher, Hugh – International Journal of Research & Method in Education, 2007
Educational researchers have a responsibility to ensure that in whatever research paradigm they work, the research that is conducted is done so within an "ethic of respect" to those who participate. This implies a number of responsibilities on the part of the researcher that include ensuring trust, dignity, privacy, confidentiality and anonymity.…
Descriptors: Internet, Confidentiality, Qualitative Research, Educational Researchers
Reutty, Michele – Computers in Libraries, 2007
Michele Reutty was director of the Free Public Library of Hasbrouck Heights for 17 years. Hasbrouck Heights is a mile-square "bedroom community" of New York City that is located in northern New Jersey. In this article, she narrates her experience--one that probably occurs with alarming regularity to professional librarians all over the…
Descriptors: Law Enforcement, Public Libraries, Police, Intellectual Freedom
Pages: 1  |  ...  |  130  |  131  |  132  |  133  |  134  |  135  |  136  |  137  |  138  |  ...  |  226