Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 17 |
Since 2016 (last 10 years) | 39 |
Since 2006 (last 20 years) | 162 |
Descriptor
Source
Author
Fain, Terry | 5 |
Sehgal, Amber | 5 |
Turner, Susan | 5 |
Schneider, Tod | 4 |
Stover, Del | 4 |
Descy, Don E. | 3 |
Kennedy, Mike | 3 |
Ashford, Tina | 2 |
Carlson, Scott | 2 |
Carr, Joetta L. | 2 |
Donovan, Erin | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 46 |
Administrators | 33 |
Teachers | 23 |
Policymakers | 18 |
Community | 6 |
Media Staff | 4 |
Parents | 2 |
Researchers | 2 |
Support Staff | 2 |
Students | 1 |
Location
California | 15 |
New Jersey | 13 |
United States | 8 |
Florida | 6 |
United Kingdom | 5 |
Virginia | 5 |
Australia | 4 |
Canada | 4 |
Michigan | 4 |
Minnesota | 4 |
Oregon | 4 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
General Educational… | 1 |
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Waits, Mary Jo; Johnson, Ryan; Silverstein, Rustin – 1998
This report describes seven categories of violent crime in Phoenix, Arizona, and provides causes, facts, preventative programs, and lessons learned pertaining to each category of violence. The categories are: (1) prenatal and early childhood; (2) families; (3) individual youth; (4) schools; (5) neighborhood and community; (6) workplace; and (7)…
Descriptors: Crime, Crime Prevention, Criminology, Family Violence
Perry, Michael J. – Parks and Recreation, 1983
Three primary kinds of crime occurring in park settings--behavioral conflicts, crimes against property, and crimes against persons--are described. Suggestions for developing solutions and prevention techniques are included. (CJ)
Descriptors: Administrator Role, Crime, Crime Prevention, Parks
Smallwood, Scott – Chronicle of Higher Education, 2002
Discusses how the killing of three professors by a suicidal student horrified the University of Arizona and prompted colleges around the country to consider ways of heading off such rare violence. (EV)
Descriptors: College Faculty, Crime Prevention, Higher Education, Homicide
Nemtsova, Anna – Chronicle of Higher Education, 2008
From the top down, says the writer, Russia's universities are impoverished by bribery and insider deals large and small. A new president's dorm at Nizhniy Novgorod is one example of what anti-corruption watchdogs say is widespread mismanagement, and in some cases outright corruption, throughout the country's higher-education system. Presidents use…
Descriptors: Higher Education, Access to Education, Educational Quality, Social Values
McKeever, Lucy – Assessment & Evaluation in Higher Education, 2006
Although the exponential growth of the Internet has made it easier than ever to carry out plagiarism, it has also made it much easier to detect. This paper gives an overview of the many different methods of detecting web-based plagiarism which are currently available, assessing practical matters such as cost, functionality and performance.…
Descriptors: Plagiarism, Internet, Cheating, Web Sites
Azarmsa, Reza; Bidgoli, Hossein – Executive Educator, 1988
School computer files are vulnerable to theft and tampering, especially if computers are linked through networking or time-sharing to other public and private databases. This article suggests basic steps and guidelines to ensure that only authorized people are allowed in the computer room and that the hardware stays put. (MLH)
Descriptors: Computers, Crime Prevention, Elementary Secondary Education, School Security
American Libraries, 1983
Presents responses of five major bibliographic facilities--Library of Congress MARC program, Online Computer Library Center (OCLC), Research Libraries Information Network (RLIN), Washington Library Network (WLN), and University of Toronto Library Automated System (UTLAS)--to a set of fictional situations involving computer crime and security. (EJS)
Descriptors: Crime, Crime Prevention, Databases, Emergency Programs
Nilsson, Fredrik – American School & University, 2002
Discusses affordable and practical security solutions, such as networked video systems, that are available to meet schools' needs for highly functional, low-cost surveillance. (EV)
Descriptors: Computer Networks, Crime Prevention, School Safety, Schools
Belshaw, Scott H.; Kritsonis, William Allan – Online Submission, 2006
This article deals with effective strategies to show that educators and school administrators can utilize court-ordered mentors, for at-risk juveniles placed in their classrooms. In the late 1980s and 1990s there was a convergence of two major events in juvenile justice. These were the reduction of government funds to address serious social…
Descriptors: Secondary School Students, Social Problems, Courts, Mentors
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
What would people do without the Internet? It gives them the world at their fingertips. Almost anything that they want and need can be found in one neat little place. The Internet is a great place for kids also. They can be entertained, chat with friends, and learn about whatever interests them. Unfortunately the Internet also helps people…
Descriptors: Internet, Computer Security, Child Safety, Computer Mediated Communication
Miller, Jerry; Rowe, William; Rapp-Paglicci, Lisa; Ersing, Robin – Metropolitan Universities, 2008
Prodigy is an example of a program that is successful due to its being a program that is community engaged. Prodigy is a community arts program, crime prevention and diversion program, serving ten thousand people in seven counties. This article discusses the roles, challenges, and successes of the partnerships with the School of Social Work at the…
Descriptors: Fine Arts, Crime Prevention, Counties, Public Agencies
Moore, Mark H.; Tumin, R. Zachary – 1996
The Office of the Inspector General of the New York City School Construction Authority (SCA) is attempting to secure the School Construction Authority and its building program from crime, corruption, and racketeering. This report is a preliminary assessment of this effort. It sets forth for practitioners and theorists the strategy that guided the…
Descriptors: Crime Prevention, Elementary Secondary Education, Planning, Public Schools
Green, Mary W. – 1999
This guide provides basic guidelines to help schools, in collaboration with law enforcement agencies, analyze their vulnerability to violence, theft, and vandalism, and suggest possible technologies to effectively address these problems. It describes existing commercially available technologies and urges thoughtful consideration of not only the…
Descriptors: Crime Prevention, Elementary Secondary Education, Guidelines, Public Schools
Kennedy, Mike – American School & University, 2002
Describes how growing acceptance of security measures such as access-control cards, video surveillance, and biometric devices is allowing colleges to protect students and their belongings more effectively. (EV)
Descriptors: College Buildings, College Housing, Crime Prevention, School Security
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention