NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 53 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lachheb, Ahmed; Abramenka-Lachheb, Victoria; Moore, Stephanie; Gray, Colin – British Journal of Educational Technology, 2023
Maintaining students' privacy in higher education, an integral aspect of learning design and technology integration, is not only a matter of policy and law but also a matter of design ethics. Similar to faculty educators, learning designers in higher education play a vital role in maintaining students' privacy by designing learning experiences…
Descriptors: Design, Ethics, Privacy, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Margaret L. Schmitt; Christine Hagstrom; Caitlin Gruer; Azure Nowara; Katie Keeley; Nana Ekua Adenu-Mensah; Marni Sommer – Journal of Adolescent Research, 2024
The aim of this study was to better understand the role of school bathrooms in shaping the menstrual experiences of adolescents in the U.S.A. The participants were Black and Latina, low-income adolescent girls (15-19) and adults interacting closely with youth in three U.S.A. cities (Chicago, Los Angeles, New York City). Data collection methods…
Descriptors: Adolescents, Adolescent Attitudes, Females, Poverty Areas
Nichols, T. Philip; Monea, Alexander – Phi Delta Kappan, 2023
T. Philip Nichols and Alexander Monea explore the spread of data-driven surveillance (i.e., dataveillance) technologies in schools, which are increasingly used as a strategy for mitigating safety risks. They argue that the sense of security schools derive from these technologies often comes at the cost of students' actual well-being and privacy.…
Descriptors: Student Records, School Safety, Risk Management, Well Being
Peer reviewed Peer reviewed
Direct linkDirect link
Utter, Hannah; Polacsek, Michele; Emond, Jennifer A. – Journal of School Health, 2022
Background: Digital technology is becoming a central component of schooling. We measured parents perceptions of their children's digital privacy on school-issued digital devices. Methods: We surveyed 571 parents of K-12th grade children, recruited nationally, regarding their child's use of school-issued devices. Parents reported their awareness…
Descriptors: Parent Attitudes, Privacy, School Policy, Educational Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Jonathan D.; Levin, Douglas A. – Journal of Cases in Educational Leadership, 2020
School systems collect and maintain increasingly significant amounts of data and information on students, faculty, and staff and have a duty of care to ensure that sensitive information remains secure. Therefore, sitting and/or aspiring school leaders need to develop at least a basic understanding of data privacy and information security…
Descriptors: Information Security, School Policy, Policy Formation, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Michael; Klein, Carrie – Journal of Higher Education, 2020
The proliferation of information technology tools in higher education has resulted in an explosion of data about students and their contexts. Yet, current policies governing these data are limited in their usefulness for informing students, instructors, and administrators of their rights and responsibilities related to data use because they are…
Descriptors: Discourse Analysis, Privacy, School Policy, Policy Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Richardson, Michael D.; Lemoine, Pamela A.; Stephens, Walter E.; Waller, Robert E. – Educational Planning, 2020
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st century. Computer security is an essential instrument for protecting children, but K-12 schools are considered one of the most attractive targets for data privacy crimes often due to the less-than-effective cybersecurity practices in schools. The human…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Menevse, Aliye – Educational Research and Reviews, 2019
This study aims to investigate how job search affects self-control of students using social network. This study was conducted on students studying in different departments and within the departments of Physical Education and Sports (BESB). A total of 600 students in the 21 ± 25 age group participated in the employment questionnaire. The statistics…
Descriptors: Job Search Methods, Social Media, Self Control, Physical Education
Peer reviewed Peer reviewed
Direct linkDirect link
Stiegler, Sam – Curriculum Inquiry, 2016
This paper places under examination the arguments used to fight against school policies and legislation intended to guarantee and protect the rights of trans students. That is, the paper's central investigation works to uncover the regimes of truth about children, gender, race and privacy implicit in the methods employed by activists who seek to…
Descriptors: Sexual Identity, Student Characteristics, School Policy, Student Rights
Peer reviewed Peer reviewed
Direct linkDirect link
Sauers, Nicholas J.; Richardson, Jayson W. – Journal of Research on Technology in Education, 2019
School leaders around the world navigate a learning environment where most students have (or soon will have) ubiquitous access to an Internet-connected device. As a result, districts have implemented acceptable use policies (AUPs) to address the ways that students are using those technologies. In this study, we analyzed the AUPs of 75 one-to-one…
Descriptors: Computer Use, Policy Formation, Student Empowerment, Board of Education Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Eckes, Suzanne E. – Journal of LGBT Youth, 2017
As society's views of sexual orientation and gender identity have significantly evolved in recent years, school districts across the country are addressing how to create policies that align with the law in this area. One recent issue involves laws and policies focused on transgender students and their right to access restrooms that align with…
Descriptors: Sexual Orientation, Sexual Identity, School Districts, School Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Lagotte, Brian W. – Educational Policy, 2014
Although a decade has passed since passage, few have noticed that section 9528 in No Child Left Behind (NCLB) mandates schools to assist military recruiting. This article focuses on administrators' responsibility to inform parents of their privacy rights and the struggle to manage recruiting in schools. I highlight two conclusions with policy…
Descriptors: Armed Forces, Recruitment, Administrator Responsibility, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Lennon, Sean M. – Educational Forum, 2013
Online social networks such as Facebook have changed the context and definitions of socialization. Focusing on teacher use, this article considers the size and impact of these forums and the importance many young professionals feel toward them. Themed as a common sense approach, the author uses anecdotal points and discussions with…
Descriptors: Social Networks, Educational Technology, Computer Uses in Education, Technology Integration
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4