NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)4
Since 2006 (last 20 years)18
Audience
Parents2
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 67 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brenner, Philip S. – Field Methods, 2019
In today's survey climate, many individuals doubt the legitimacy of survey invitations. Phishing, an Internet-based fraud that tricks users into disclosing private information, has the potential to further erode the perceived legitimacy of e-mailed survey invitations and harm cooperation. However, no study has tested the effect of phishing on…
Descriptors: Response Rates (Questionnaires), Experiments, Credibility, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Mattison, Marian – Journal of Social Work Education, 2018
The inclusion of remote digital practices (e-mail, texting, blogging, social media) to deliver social work services raises unique ethical and legal challenges for client and practitioner. Competent care necessitates providing clients with information that would materially affect clients' decisions whether to assume the risks, benefits, and…
Descriptors: Standards, Informed Consent, Social Work, Caseworkers
Peer reviewed Peer reviewed
Direct linkDirect link
Pantas, Susanna; Miller, Sean A.; Kulkarni, Shanti J. – Journal of Teaching in Social Work, 2017
Social work students created a community activism project to raise awareness about trauma prevalence and impact. Trauma theory describes silencing as the mechanism that hinders individual and community healing. Therefore, students sought to create an interactive opportunity to heighten trauma visibility on campus. They created a physical mailbox…
Descriptors: Activism, Social Work, Counselor Training, Trauma
Peer reviewed Peer reviewed
Direct linkDirect link
Christofides, Emily; Wood, Eileen; Benn, Amanda Catherine; Desmarais, Serge; Westfall, Krista – Mentoring & Tutoring: Partnership in Learning, 2017
Disclosure is a critical element of interpersonal relationships and individuals are often evaluated on what they share with others, whether in personal, professional, or learning contexts. Technology now allows for many different outlets for communicating with other people. We used experimental methods to explore the impact of communication medium…
Descriptors: Mentors, Peer Relationship, Research Design, Student Surveys
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Fang; Wang, Shudong – Turkish Online Journal of Educational Technology - TOJET, 2014
This research investigates East Asian students' perceptions towards e-learning privacy. The survey was first carried out in Japan (N1 = 255) and China (N2 = 307) in 2009. In 2012 the same survey was conducted again in these two countries but with different participants (N3 = 175, N4 = 63). To survey in different countries is to verify whether…
Descriptors: Foreign Countries, Student Attitudes, Educational Technology, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Mattison, Marian – Social Work, 2012
The author addresses the risks and benefits of incorporating therapeutic e-mail communication into clinical social work practice. Consumer demand for online clinical services is growing faster than the professional response. E-mail, when used as an adjunct to traditional meetings with clients, offers distinct advantages and risks. Benefits include…
Descriptors: Risk, Therapy, Methods, Social Work
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Sora; Yi, Soon-Hyung – Children & Society, 2010
This study discusses privacy risk factors when commercial web sites target primary school children in Korea. Specifically, the authors examined types of personal information required for membership subscriptions and whether privacy policies at commercial sites for children abide by privacy guidelines. A total of 159 commercial sites targeting…
Descriptors: Risk, Foreign Countries, Content Analysis, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stephens, James H.; Parrillo, Anthony V. – Health Educator, 2011
The confidentiality of a patient's information has been sacred since the days of Hippocrates, the Father of Medicine. Today, however, merely taking an oath to respect a patient's privacy has been overshadowed by regulations governing how certain healthcare establishments handle an individual's health information on the web. Consequently, if a…
Descriptors: Electronic Mail, Physicians, Health Insurance, Confidentiality
Hastings, Robin – Computers in Libraries, 2010
In August 2008, the Missouri River Regional Library (MRRL), where the author serves as information technology coordinator, switched over from an internally hosted Microsoft Exchange email server to the Google Apps product. As the person who led the charge to use Google Apps and the person who actually flipped the switch, he was responsible for…
Descriptors: Information Technology, Public Libraries, Privatization, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Davis, Katie; James, Carrie – Learning, Media and Technology, 2013
There is considerable debate about young people's concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of…
Descriptors: Privacy, Early Adolescents, Middle School Students, Preadolescents
Schwartz, Harriet L. – Education Digest: Essential Readings Condensed for Quick Review, 2010
There has been much discussion about the issue of boundaries on Facebook. Some suggest faculty members can resolve potential dilemmas in relation to students by making sensible decisions about what to post and by fine-tuning privacy settings. But the challenges and opportunities run deeper. For those who want to be appropriately accessible to…
Descriptors: Electronic Mail, Social Networks, Computer Mediated Communication, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Desai, Mayur S.; Hart, Jeff; Richards, Thomas C. – Journal of Instructional Psychology, 2009
E-mail is mandatory tool of communications any business to survive in the 21st century. It is imperative that Information technology (IT) managers monitor and make sure that the e-mail systems are used properly. In order to organize a systematic process for proper use of email an administrator must have an input into the development of appropriate…
Descriptors: Electronic Mail, Information Technology, Administrators, Administrator Attitudes
Carnevale, Dan – Chronicle of Higher Education, 2008
Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…
Descriptors: Electronic Mail, Information Technology, Professional Services, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Genova, Gina L. – Business Communication Quarterly, 2009
Employers have legitimate business interests in monitoring workplace Internet use: to minimize legal exposure, to increase productivity, and to avoid proprietary information loss. Since employees arguably have no expectation of privacy in their work on employers' computers, there are few grounds for complaint if they are disciplined for straying…
Descriptors: Employees, Electronic Mail, Expectation, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5