Publication Date
| In 2026 | 0 |
| Since 2025 | 182 |
| Since 2022 (last 5 years) | 615 |
| Since 2017 (last 10 years) | 1244 |
| Since 2007 (last 20 years) | 2119 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| Australia | 80 |
| United States | 80 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 28 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kresses, Mamie – Principal, 2001
Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)
Descriptors: Elementary Secondary Education, Federal Legislation, Internet, Privacy
Ziff, Matthew – Journal of Aesthetic Education, 2004
Advances in glass technologies are being applied in contemporary interior architecture. Glass forms and surfaces are appearing in settings and applications that offer vivid aesthetic experiences for users, but create ambiguous messages concerning community and privacy. Where a modernist application of glass may have been directed toward creating a…
Descriptors: Architecture, Structural Elements (Construction), Aesthetics, Interior Space
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Goldsborough, Reid – Black Issues in Higher Education, 2004
There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…
Descriptors: Internet, Electronic Mail, Computer Mediated Communication, Computer Security
Walsh, Kieran – Advances in Health Sciences Education, 2005
We live in a celebrity-obsessed world and our medical students are no more immune to the glamour of celebrity than anyone else. When teaching medical students about a certain medical illness I used to tell them about a celebrity who suffers from this illness. I did this to get their attention and to stimulate their interest but even though the…
Descriptors: Medical Students, Medical Education, Confidentiality, Privacy
Valentine, Sean; Kidwell, Roland E. – Quality Assurance in Education: An International Perspective, 2008
Purpose: This study aims to gauge business school student perceptions of the academic conduct of college professors, to determine students' ethical evaluations of certain potential faculty behaviors. The relationships between perceived faculty misconduct and several student demographic characteristics including sex and academic classification were…
Descriptors: Undergraduate Students, Teacher Effectiveness, Cheating, Familiarity
Bullis, Ronald K. – American Journal of Sexuality Education, 2008
Two recent federal court cases have addressed the constitutionality of using sexual surveys in public schools. This article compares these cases with an earlier case dealing with the same issue but reaching different results. This article also describes the constitutional rights of parents to educate their children and the school's rights to…
Descriptors: Public Schools, Parent Rights, Court Litigation, Sex Education
Rubinstein-Ávila, Eliane – Journal of Language and Literacy Education, 2009
Whether a study is qualitative or quantitative, the process of data collection is not as orderly as it may seem when described in published research reports, articles, or books. Data collection may be more challenging when conducting research across national and linguistic borders. In this article, I share and reflect upon the complex and messy…
Descriptors: Educational Research, Research Problems, Research Opportunities, Data Collection
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Bolt, Nancy, Ed.; Burge, Suzanne, Ed. – International Federation of Library Associations and Institutions (NJ1), 2008
Libraries of government departments provide information to policymakers, to government staff and employees, and, sometimes, to the general public. It is essential that libraries of government departments are organised and managed so as to collect and provide the information most needed by government decision makers, government workers, and the…
Descriptors: Government Libraries, Guidelines, Library Administration, User Needs (Information)
Buzzi, Marina, Ed. – InTech, 2010
E-Learning is a vast and complex research topic that poses many challenges in every aspect: educational and pedagogical strategies and techniques and the tools for achieving them; usability, accessibility and user interface design; knowledge sharing and collaborative environments; technologies, architectures, and protocols; user activity…
Descriptors: Cartoons, Foreign Countries, Electronic Learning, Distance Education
Smallwood, Carol, Ed. – ALA Editions, 2011
There's no shortage of library management books out there--but how many of them actually tackle the little details of day-to-day management, the hard-to-categorize things that slip through the cracks of a larger handbook? "Library Management Tips that Work" does exactly that, addressing dozens of such issues facing library managers, including: (1)…
Descriptors: Library Administration, Time Management, Guides, Personnel Management
Jenkins, Peter; Potter, Steve – British Journal of Guidance & Counselling, 2007
The introduction of the Data Protection Act 1998 has presented significant challenges to counselling recording, through its detailed requirements for the processing of personal data. The impact of these changes on recording in Higher Education counselling services in the UK is explored, using responses from an electronic survey of universities and…
Descriptors: Higher Education, Professional Autonomy, Accountability, Privacy
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security

Peer reviewed
Direct link
