Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 17 |
Since 2016 (last 10 years) | 39 |
Since 2006 (last 20 years) | 162 |
Descriptor
Source
Author
Fain, Terry | 5 |
Sehgal, Amber | 5 |
Turner, Susan | 5 |
Schneider, Tod | 4 |
Stover, Del | 4 |
Descy, Don E. | 3 |
Kennedy, Mike | 3 |
Ashford, Tina | 2 |
Carlson, Scott | 2 |
Carr, Joetta L. | 2 |
Donovan, Erin | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 46 |
Administrators | 33 |
Teachers | 23 |
Policymakers | 18 |
Community | 6 |
Media Staff | 4 |
Parents | 2 |
Researchers | 2 |
Support Staff | 2 |
Students | 1 |
Location
California | 15 |
New Jersey | 13 |
United States | 8 |
Florida | 6 |
United Kingdom | 5 |
Virginia | 5 |
Australia | 4 |
Canada | 4 |
Michigan | 4 |
Minnesota | 4 |
Oregon | 4 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
General Educational… | 1 |
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Cermele, Jill A. – Feminist Teacher: A Journal of the Practices, Theories, and Scholarship of Feminist Teaching, 2004
Violence against women figures as a common topic in a variety of college courses, including those in psychology, sociology, criminology, and women's studies. The data on the risk of sexual assault for college women makes this a topic of particular interest and importance to many college students. Although it is fairly easy to find statistics about…
Descriptors: Womens Studies, Sexual Abuse, Crime Prevention, Females
Keels, Crystal L. – Black Issues in Higher Education, 2004
Crime is increasingly characterizing the contemporary college experience. In a post-Columbine, post-Sept. 11 world, the "It can't happen here" response to such violence has been replaced with "Oh Lord, not again." In response to the loss of their daughter, and the lack of institutional support they received, Howard, and Connie Clery filed suit…
Descriptors: Campuses, Educational Environment, School Safety, Higher Education
Seave, Paul L. – Evaluation Review, 2006
Laws that prohibit persons under a domestic violence restraining order from purchasing or possessing a firearm are a primary way to keep guns out of the hands of batterers. In July 2005, the California Attorney General's Task Force on the Local Criminal Justice Response to Domestic Violence issued a report called Keeping the Promise: Victim Safety…
Descriptors: Family Violence, Gun Control, State Legislation, State Regulation
Gillen, John – Child Care in Practice, 2006
This is an extract from a speech given by Mr Justice Gillen to a conference in Belfast organised by Children Law UK in January 2006. It addresses the potential conflict between the concept of the welfare of children inherent in the family care system and that of responsibility inherent in the criminal justice system. It questions whether the…
Descriptors: Child Welfare, Justice, Crime, Responsibility
Drexel Univ., Philadelphia, PA. Microcomputing Program. – 1985
This paper describes a hot-stamping operation undertaken at Drexel University in an attempt to prevent computer theft on campus. The program was initiated in response to the University's anticipated receipt of up to 3,000 Macintosh microcomputers per year and the consequent publicity the university was receiving. All clusters of computers (e.g.,…
Descriptors: Crime Prevention, Educational Practices, Higher Education, Methods
Congress of the U.S., Washington, DC. House Select Committee on Narcotics Abuse and Control. – 1984
This annual report describes the activities of the House Select Committee on Narcotics Abuse and Control in 1983 and makes recommendations to the House of Representatives to control the worldwide problem of drug abuse and drug trafficking. An initial section of the report describes the jurisdiction, authority, funding, and organization of the…
Descriptors: Annual Reports, Committees, Crime Prevention, Drug Abuse
Beaudoin, Ralph H. – Business Officer, 1985
The susceptibility of colleges and universities to computer crime is great. While insurance coverage is available to cover the risks, an aggressive loss-prevention program is the wisest approach to limiting the exposures presented by computer technology. (MLW)
Descriptors: College Administration, Computers, Crime, Crime Prevention

Shuman, Bruce A. – Public Libraries, 2002
Considers possible options for public librarians dealing with problem patrons. Highlights include considering the safety of the patrons and staff; general considerations of library security, including security guards, legal responsibility for patrons and staff safety; and working through possible options ahead of time to be more prepared. (LRW)
Descriptors: Crime, Crime Prevention, Legal Responsibility, Library Personnel
Richards, George E. – American School Board Journal, 1997
A task force, charged with uncovering weaknesses in existing security school systems in Knox County, Tennessee, developed a checklist survey and sent it to each of the 85 building principals. Displays some of the questions but advises involving community members in the process of creating a security survey. (MLF)
Descriptors: Alarm Systems, Crime Prevention, Elementary Secondary Education, Public Schools
Renick, Judy – School Business Affairs, 2002
Describes the Texas School Safety Center, established by the Texas legislature to provide interdisciplinary resources to promote school safety statewide through activities such as regional training institutes, youth leadership training, and technical assistance. Provides an example from the "Proactive Guide for Threat of Terrorism in Schools,"…
Descriptors: Crime Prevention, Elementary Secondary Education, School Safety, Training
Ring, David S. – American School & University, 1997
Explores school bathroom vandalism prevention strategies and tips in improving sanitary conditions. Ways of removing temptation from primary bathroom targets are highlighted, including adding warm-air hand dryers and sensor faucets. (GR)
Descriptors: Crime Prevention, Educational Facilities, Elementary Secondary Education, Public Schools
Carlson, Scott – Chronicle of Higher Education, 2002
Discusses how colleges are creating offices to handle crimes, near-crimes, human errors, dramas, and assorted foibles on increasingly Internet-connected campuses. (EV)
Descriptors: College Students, Computer Security, Crime Prevention, Higher Education
School Planning & Management, 2002
Describes how a New Hampshire school system eliminated internal school vandalism and bomb threats, and reduced the number of false alarms, by using video security software (WebEyeAlert security solution) that is accessible via a variety of methods from remote locations. (Author/EV)
Descriptors: Computer Software, Crime Prevention, School Security, School Vandalism
Our Children, 1999
Describes the importance of developing a school violence prevention and crisis response plan, explaining what an effective plan should include; how to establish a school-based team; essential components of a crisis response plan; how to ensure safety via contingency provisions to the crisis response plan; and how to handle the crisis aftermath. A…
Descriptors: Crime Prevention, Crisis Intervention, Elementary Secondary Education, Planning

Butts, Jeffrey A.; Mears, Daniel P. – Youth & Society, 2001
Describes prominent new developments in juvenile justice, focusing on the origins of juvenile justice; the get-tough movement, which emphasizes punishment (transfer to criminal court); and promising ideas in rehabilitation, prevention, and early intervention. Suggests that a new generation of innovative programs might revive the spirit of U.S.…
Descriptors: Adolescents, Community Involvement, Crime Prevention, Delinquency