NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,126 to 1,140 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Abma, Tineke A.; Leyerzapf, Hannah; Landeweer, Elleke – American Journal of Evaluation, 2017
Responsive evaluation honors democratic and participatory values and intends to foster dialogues among stakeholders to include their voices and enhance mutual understandings. The question explored in this article is whether and how responsive evaluation can offer a platform for moral learning ("Bildung") in the interference zone between…
Descriptors: Evaluation, Psychiatry, Medical Services, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Oltmann, Shannon M. – College & Research Libraries, 2017
In this study, deans and directors of academic libraries were surveyed about intellectual freedom. The survey found that most respondents said they rarely think about intellectual freedom yet said it was "somewhat" or "very" important in their libraries. Most did not have formal intellectual freedom policies; they often relied…
Descriptors: Intellectual Freedom, Academic Freedom, Academic Libraries, Deans
Toppe, Michele L. – ProQuest LLC, 2017
According to higher education policy experts, "Campus threat assessment is not merely a recommendation, but an emerging standard of care." However, despite evidence of the emergence of this standard and the consistency of recommendations that comport with those made by the Virginia Tech Review Panel, college campuses continue to vary…
Descriptors: School Safety, Risk Assessment, Colleges, Campuses
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices
US Department of Education, 2021
As a precursor to this annual report, in February 2018, the Department issued its "U.S. Department of Education Strategic Plan for Fiscal Years [FY] 2018-22" ("Strategic Plan") (see ED586968). The "Strategic Plan" establishes four broad, overarching goals--one goal each in the areas of K-12 education, postsecondary…
Descriptors: Public Agencies, Federal Government, Strategic Planning, Educational Planning
British Columbia Teachers' Federation, 2021
British Columbia (BC) has experienced a significant teacher shortage for years. While every region of the province is impacted, rural and remote communities have experienced a worsening shortage especially during the pandemic. Additionally, there is a critical shortage of specialist teachers across the province. This Education Brief outlines five…
Descriptors: Foreign Countries, Teacher Shortage, Rural Education, Specialists
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stahl, William M.; Karger, Joanne – Journal of Special Education Leadership, 2016
The rapid adoption of digital content and delivery systems, each with its own capacity to track, store, and analyze student usage, interactions, and academic outcomes at both a highly detailed and granular level, has emerged as an area of widespread opportunity, but also of concern. The comingling of various student data sets (demographics, usage,…
Descriptors: Privacy, Electronic Learning, Special Education, Disabilities
Peer reviewed Peer reviewed
Direct linkDirect link
Stiegler, Sam – Curriculum Inquiry, 2016
This paper places under examination the arguments used to fight against school policies and legislation intended to guarantee and protect the rights of trans students. That is, the paper's central investigation works to uncover the regimes of truth about children, gender, race and privacy implicit in the methods employed by activists who seek to…
Descriptors: Sexual Identity, Student Characteristics, School Policy, Student Rights
Antony, Laljith – ProQuest LLC, 2016
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Descriptors: Computer Software, Qualitative Research, Case Studies, Information Security
Trainor, Sonja – Phi Delta Kappan, 2015
An introduction to the big picture conversation on student data privacy and the norms that are coming out of it. The author looks at the current state of federal law, and ahead to proposed legislation at the federal level. The intent is to help educators become familiar with the key issues regarding student data privacy in education so as to…
Descriptors: Privacy, Student Records, Data, Federal Legislation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bonner, Euan; Reinders, Hayo – Teaching English with Technology, 2018
This article aims to provide teachers with a practical introduction to the capabilities of augmented and virtual reality (AR/VR) in foreign language education. We first provide an overview of recent developments in this field and review some of the affordances of the technologies. This is followed by detailed outlines of a number of activities…
Descriptors: Computer Simulation, Second Language Learning, Second Language Instruction, English (Second Language)
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zaza, Christine; McKenzie, Amanda – Canadian Journal for the Scholarship of Teaching and Learning, 2018
While the text-matching tool, Turnitin®, has traditionally been used to deter and detect plagiarism, more recently, instructors have started to use this tool for formative self-assessment. To describe Turnitin®'s use in practice and to explore perceptions of this tool, we surveyed 940 students, teaching assistants, and instructors at a Canadian…
Descriptors: Computer Software, Plagiarism, College Students, Formative Evaluation
Foundation for Excellence in Education (ExcelinEd), 2018
This document contains a model policy for a partnership for traditionally underrepresented student achievement. The model legislation stipulates terms relating to: (1) the intent of the state and goal of the partnership; (2) definitions of terms; (3) the partnership sought by the (state) Department of Education (department); (4) the partner…
Descriptors: State Legislation, Educational Legislation, Disproportionate Representation, Advanced Placement Programs
Kazouh, Ashley; Hollowell, Adam; Fox, Lauren; Bentley-Edwards, Keisha – Public School Forum of North Carolina, 2020
In what ways and to what extent has the COVID-19 pandemic impacted racial and socioeconomic inequities in educational opportunity and access in North Carolina? This report, commissioned by the Brady Education Foundation and prepared by researchers at the Public School Forum of North Carolina and the Samuel DuBois Cook Center on Social Equity at…
Descriptors: Elementary Secondary Education, COVID-19, Pandemics, Outcomes of Education
Pages: 1  |  ...  |  72  |  73  |  74  |  75  |  76  |  77  |  78  |  79  |  80  |  ...  |  226