Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedPershing, James A.; Pershing, Jana L. – Human Resource Development Quarterly, 2001
Question dimensions, construction, and response formats of 50 reactionnaire forms completed by participants in medical school programs were analyzed. Numerous problems in 30 forms and shortcomings in 20 others were identified. Ways to improve layout, appearance, anonymity protection, and questions were suggested. (Contains 53 references.) (SK)
Descriptors: Attitude Measures, Evaluation Problems, Privacy, Surveys
Peer reviewedEnglish, Leona M. – New Directions for Adult and Continuing Education, 2001
Ethical issues involved in using journals in education include balancing the personal and professional and assessing journal writing. Principles adult educators can apply include respect, justice, beneficence, self-awareness, and caring. (Contains 26 references.) (SK)
Descriptors: Adult Education, Educational Principles, Ethics, Journal Writing
Peer reviewedRobinson, Robert K.; And Others – Journal of Education for Business, 1996
Discusses potential liability concerns for public and private colleges and universities regarding public disclosure of faculty teaching evaluations. Guidelines for dealing with these records are given. (SK)
Descriptors: Confidential Records, Disclosure, Higher Education, Legal Responsibility
Flanigan, Robin L. – American School Board Journal, 2000
Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)
Descriptors: Electronic Equipment, Privacy, School Security, Secondary Education
Peer reviewedBernstein, Alan – T.H.E. Journal, 1998
Describes an electronic mail project that was designed to create an electronic mailing list of parents so the high school's administrators could communicate with parents on a regular basis and keep them informed of school-related news. Issues of privacy and confidentiality are discussed, and Web sites are considered. (LRW)
Descriptors: Administrators, Confidentiality, Electronic Mail, High Schools
Van Horn, Royal – Phi Delta Kappan, 2004
The Internet was designed as an open system that promoted the two-way flow of information. In other words, everything that is sent has a return address called an IP or Internet Protocol address of the form: 000.11.222.33. Whenever you connect to a website, the site learns your IP address. It also learns the type of computer you are using, the…
Descriptors: Web Sites, Social Networks, Internet, Privacy
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it…
Descriptors: School Nurses, Confidentiality, Risk, Computer Software
Dence, Thomas P.; Heath, Steven – Mathematics and Computer Education, 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how…
Descriptors: Technology, Probability, Number Concepts, Mathematical Concepts
Essex, Nathan L. – Education and the Law, 2005
The Fourth Amendment to the US Constitution provides protection of all citizens against unreasonable search and seizure. The US Supreme Court has affirmed that the basic purpose of the Fourth Amendment is to safeguard the privacy and security of individuals against unreasonable intrusive searches by governmental officials. Since students possess…
Descriptors: Student Rights, Privacy, Public Schools, Search and Seizure
Rampell, Catherine – Chronicle of Higher Education, 2008
This article reports that several colleges and universities like Purdue University are mining data they have about students to try to improve retention. The institutions analyze years' worth of data on which students did well and which did poorly, and what variables--whether they be SAT scores, financial-aid status, or attendance at the dining…
Descriptors: Data Analysis, School Holding Power, Computer Mediated Communication, Academic Achievement
Baker, Thomas R. – New Directions for Student Services, 2008
This chapter describes the relationship between federal student privacy laws and state privacy laws, and identifies the changes in the federal law over the last ten years affecting disclosure to parents of college students. Recent litigation on health emergencies is outlined and the limited rights of college students not yet eighteen years of age…
Descriptors: College Students, Access to Information, Privacy, Information Policy
Kurowski, Scotia; Reiss, Rebecca – American Biology Teacher, 2007
This article describes a forensic DNA science laboratory exercise for advanced high school and introductory college level biology courses. Students use a commercial genotyping kit and genetic analyzer or gene sequencer to analyze DNA recovered from a fictitious crime scene. DNA profiling and STR genotyping are outlined. DNA extraction, PCR, and…
Descriptors: Science Laboratories, Persuasive Discourse, Biology, Privacy
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Honawar, Vaishali – Education Week, 2007
Videos of teachers that students taped in secrecy are all over online sites like YouTube and MySpace. Angry teachers, enthusiastic teachers, teachers clowning around, singing, and even dancing are captured, usually with camera phones, for the whole world to see. Some students go so far as to create elaborately edited videos, shot over several…
Descriptors: Internet, Telecommunications, Videotape Recordings, Teacher Rights
Talab, Rosemary S.; Butler, Rebecca P. – TechTrends: Linking Research and Practice to Improve Learning, 2007
The concept of "publishing" has changed again, just in the last few years, due to YouTube, Blogger, Second Life, Flickr, and other new social networking tools (John Marshall Law School, 2005). Whether they are making it possible for everyone to view a video on YouTube on how to install a hard drive on a Mac, add a collaborative student writing…
Descriptors: Guidelines, Privacy, Copyrights, Internet

Direct link
