NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,096 to 1,110 of 3,403 results Save | Export
Mogel, Wendy – Independent School, 2013
In this article, Wendy Mogel describes a time in a child's life that many parents need to be reminded of--"joyful secrecy." It is an essential part of growing up, just like the carefree days described in "The Adventures of Huckleberry Finn" (Mark Twain). Healthy children's development still requires it even if we are…
Descriptors: Child Development, Privacy, Imagination, Freedom
Peer reviewed Peer reviewed
Direct linkDirect link
Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah – Journal of Educational Measurement, 2015
This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…
Descriptors: Scoring, Essays, Computer Assisted Testing, Natural Language Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Su, Shu-Ching; Sedory, Stephen A.; Singh, Sarjinder – Sociological Methods & Research, 2015
In this article, we adjust the Kuk randomized response model for collecting information on a sensitive characteristic for increased protection and efficiency by making use of forced "yes" and forced "no" responses. We first describe Kuk's model and then the proposed adjustment to Kuk's model. Next, by means of a simulation…
Descriptors: Data Collection, Models, Responses, Efficiency
Englander, Elizabeth – Educational Leadership, 2015
Most kids are very much aware that the Internet isn't, by and large, a private space. In fact, most teens have been hearing that message since elementary school. But despite being educated about these issues, many teens continue to engage in digital behaviors that imply that they really don't understand how public and permanent the Internet really…
Descriptors: Internet, Computer Mediated Communication, Adolescents, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Millett, Stephan; O'Leary, Peter – Research Ethics, 2015
This paper argues that specific individual informed consent and other forms of consent predicated on a right to autonomy may not in all circumstances be appropriate for the establishment and use of large data sets of health information. We suggest that there are inherent failings in such an approach, shortcomings that we analyse below. We argue…
Descriptors: Informed Consent, Access to Information, Databases, Health
Peer reviewed Peer reviewed
Direct linkDirect link
Crossen-White, Holly L. – Research Ethics, 2015
Online digital archives have allowed researchers to explore the past as never before. Arguably without the search technology offered by online digital archives the lives of many individuals would have remained in obscurity. Furthermore, the level of detail that can be quickly gleaned about individuals from the past, particularly when multiple…
Descriptors: Archives, Information Storage, Ethics, History
Peer reviewed Peer reviewed
Direct linkDirect link
Raible, Claire A.; Dick, Rebecca; Gilkerson, Fern; Mattern, Cheryl S.; James, Lisa; Miller, Elizabeth – Journal of School Health, 2017
Background: Project Connect is a national program to build partnerships among public health agencies and domestic violence services to improve the health care sector response to partner and sexual violence. Pennsylvania piloted the first school nurse-delivered adolescent relationship abuse intervention in the certified school nurses' office…
Descriptors: School Nurses, Prevention, Intervention, Surveys
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan – Information Research: An International Electronic Journal, 2017
Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…
Descriptors: Foreign Countries, College Students, Gender Differences, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Pantas, Susanna; Miller, Sean A.; Kulkarni, Shanti J. – Journal of Teaching in Social Work, 2017
Social work students created a community activism project to raise awareness about trauma prevalence and impact. Trauma theory describes silencing as the mechanism that hinders individual and community healing. Therefore, students sought to create an interactive opportunity to heighten trauma visibility on campus. They created a physical mailbox…
Descriptors: Activism, Social Work, Counselor Training, Trauma
Ingersoll, Julia S. – ProQuest LLC, 2017
On April 16, 2007, a student at Virginia Tech University, known to be mentally ill, went on a rampage shooting 49 people on campus before taking his own life. When it was over, 32 people were dead, and the concept of a safe campus was forever changed. The incident revealed the inherent conflicts between campus safety concerns and students' civil…
Descriptors: College Students, School Safety, Civil Rights, Violence
Roberson, Amanda Janice; Rorison, Jamey; Voight, Mamie – Institute for Higher Education Policy, 2017
Accurate and complete data can empower college choices, promote student success, and inform federal, state and institutional policies. Yet existing postsecondary student data systems are disconnected, duplicative and incomplete. "A Blueprint for Better Information: Recommendations for a Federal Postsecondary Student-Level Data Network"…
Descriptors: Postsecondary Education, Student Records, Information Storage, Information Security
Council of the Great City Schools, 2017
Equipping today's children with 21st century skills for the digital age requires turning traditional classrooms into a digital-learning ecosystem and ensuring teachers have professional skills and unfettered access to tools they need for 21st century teaching and learning. School district networks are being used for instruction, business, and…
Descriptors: Information Security, Educational Technology, Information Management, Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Burgunder, Lee B. – Journal of Legal Studies Education, 2016
Richard Prince a well-known appropriation artist, made headlines by pressing ever deeper into the gray areas of art, technology, and the law. Specifically, Prince took screenshots of personal photographs that were publicly displayed on Instagram accounts, included his own comments, enlarged and printed them on large canvases, and displayed them at…
Descriptors: Photography, Visual Aids, Social Media, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
Zeide, Elana – State Education Standard, 2016
Since 2013, most states have considered one or more bills to protect student data, with many giving state boards of education more authority in this arena. The best of this legislation goes beyond compliance to better address stakeholders' fears. States that take this approach have adopted two key practices in implementation of new state laws:…
Descriptors: Student Records, Privacy, Information Security, State Legislation
Adams, Helen R. – Knowledge Quest, 2016
The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…
Descriptors: Privacy, Consciousness Raising, Internet, Child Safety
Pages: 1  |  ...  |  70  |  71  |  72  |  73  |  74  |  75  |  76  |  77  |  78  |  ...  |  227