Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 10 |
Descriptor
Information Policy | 11 |
Internet | 11 |
Access to Information | 4 |
Foreign Countries | 4 |
Copyrights | 3 |
Information Technology | 3 |
Use Studies | 3 |
Web Sites | 3 |
Bullying | 2 |
Discipline Policy | 2 |
Electronic Publishing | 2 |
More ▼ |
Source
Author
Parry, Marc | 2 |
Achinewhu-Nworgu, Elizabeth | 1 |
Azaiki, Steve | 1 |
Cantor, Scott | 1 |
Carmody, Steven | 1 |
Cassidy, Wanda | 1 |
Cox, Andrew | 1 |
Emmott, Stephen | 1 |
Faucher, Chantal | 1 |
Green, John | 1 |
Hoehn, Walter | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 7 |
Reports - Research | 4 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 11 |
Postsecondary Education | 3 |
Adult Education | 1 |
Audience
Media Staff | 1 |
Location
United Kingdom | 3 |
Canada | 1 |
Nigeria | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Washington, Edwina Thomas – Adult Learning, 2015
Bullying is a social problem. The proliferation of electronic technology has provided a new forum for bullies to harm victims. That is, bullies can transmit harmful text messages, photos, or video over the Internet and other digital communication devices to victims. This malpractice of technology-oriented phenomenon known as cyberbullying has…
Descriptors: Higher Education, Bullying, Social Networks, Internet
Achinewhu-Nworgu, Elizabeth; Azaiki, Steve; Nworgu, Queen Chioma – Bulgarian Comparative Education Society, 2016
This paper aims to present the role, values, and legal policy issues facing public Library resources in supporting students to achieve academic success. Research indicates that majority of people that own or work in the Library tend to ignore some of the vital roles, values and legal policy issues paramount to libraries. Some of these issues are…
Descriptors: Public Libraries, Library Materials, Academic Achievement, Foreign Countries
Faucher, Chantal; Jackson, Margaret; Cassidy, Wanda – Canadian Journal of Higher Education, 2015
This article reports on findings from a scan of 465 policies relevant to the handling of cyberbullying in 74 Canadian universities. It first assesses the commonalities and differences in the policies. Second, it considers how their various lenses--a human rights perspective versus a student conduct perspective, for instance--can affect the…
Descriptors: Bullying, Information Policy, Universities, Policy Analysis
Green, John; Rutherford, Scott; Turner, Thomas – Perspectives: Policy and Practice in Higher Education, 2009
The authors recognise that there is no "one-size-fits-all" approach to implementing business intelligence strategy within universities. Elements of best practice have been taken from a case study of Imperial College, which may be applied across other institutions. The process starts with implementing and developing systems that capture…
Descriptors: Intelligence, Internet, Information Policy, Universities
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Howard, Jennifer – Chronicle of Higher Education, 2009
Senior scholars, the A-list of academic publishing, seem to submit fewer unsolicited manuscripts to traditional humanities journals than they used to. The journal has become, with very few exceptions, the place where junior and midlevel scholars are placing their work. Technology and changing habits have called into question the nature of the…
Descriptors: Periodicals, Internet, Humanities, Influence of Technology
Parry, Marc – Chronicle of Higher Education, 2009
As the federal government prepares to pour billions of stimulus dollars into increased broadband Internet access, colleges are trying to claim much of the money and shape the emerging national networking policy. Their focus is $4.7-billion that will be doled out under a new grant program administered by a small Commerce Department agency called…
Descriptors: Access to Information, Telecommunications, Internet, Grants
Selwyn, Neil – Assessment & Evaluation in Higher Education, 2008
Whilst the copying, falsification and plagiarism of essays and assignments has long been a prevalent form of academic misconduct amongst undergraduate students, the increasing use of the internet in higher education has raised concern over enhanced levels of online plagiarism and new types of "cyber-cheating". Based on a self-report…
Descriptors: Undergraduate Students, Plagiarism, Cheating, Internet
Cox, Andrew; Emmott, Stephen – Campus-Wide Information Systems, 2007
Purpose: The purpose of the paper is to summarize the findings of a survey of UK universities about how their websites are managed and resourced, which technologies are in use, and what are seen as the main issues and priorities. Design/methodology/approach: The paper is based on a web-based questionnaire distributed in summer 2006, which received…
Descriptors: Web Sites, Electronic Publishing, Internet, Use Studies
Pitler, Howard – Innovate: Journal of Online Education, 2006
Technology-savvy instructors often require students to create Web pages or videos, tasks that require finding materials such as images, music, or text on the Web, reusing them, and then republishing them in a technique that author Howard Pitler calls "remixing." However, this requires both the student and the instructor to deal with often thorny…
Descriptors: Legal Problems, Copyrights, Internet, Legal Responsibility
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology