Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 17 |
Since 2016 (last 10 years) | 39 |
Since 2006 (last 20 years) | 162 |
Descriptor
Source
Author
Fain, Terry | 5 |
Sehgal, Amber | 5 |
Turner, Susan | 5 |
Schneider, Tod | 4 |
Stover, Del | 4 |
Descy, Don E. | 3 |
Kennedy, Mike | 3 |
Ashford, Tina | 2 |
Carlson, Scott | 2 |
Carr, Joetta L. | 2 |
Donovan, Erin | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 46 |
Administrators | 33 |
Teachers | 23 |
Policymakers | 18 |
Community | 6 |
Media Staff | 4 |
Parents | 2 |
Researchers | 2 |
Support Staff | 2 |
Students | 1 |
Location
California | 15 |
New Jersey | 13 |
United States | 8 |
Florida | 6 |
United Kingdom | 5 |
Virginia | 5 |
Australia | 4 |
Canada | 4 |
Michigan | 4 |
Minnesota | 4 |
Oregon | 4 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
General Educational… | 1 |
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Williams, Robert – Campus Law Enforcement Journal, 2011
The University at Albany Police and the University at Albany Athletics Department have teamed together to implement a ground breaking program aimed at identifying, addressing and managing negative behavior among student athletes. ATLAS stands for: Athletics, Team Building, Leadership Development, And Mentoring for Student Athletes. The program was…
Descriptors: College Athletics, Sanctions, Police, Team Training
Arkansas Safe Schools Initiative Division, 2010
The school shooting incidents during the decade of the 1990's prompted an increase of law enforcement presence in schools. The School Violence Resource Center (SVRC) at the Criminal Justice Institute (CJI) University of Arkansas System undertook a project to determine what programs law enforcement agencies currently provide in their local schools…
Descriptors: Violence, Crime Prevention, Law Enforcement, Crime
Stuart, Reginald – Diverse: Issues in Higher Education, 2010
When Kemba Smith Pradia spoke this fall to a gathering of students at South Carolina State University, her candid talk about violence against women and the campus "hype" over drugs, sex, and money resonated with students and faculty alike. Ten years ago, Kemba Smith was wasting away in a federal prison as prisoner No. 26370-083. Used by…
Descriptors: College Students, Participation, Cocaine, Business
Baime, David S.; Mullin, Christopher M. – American Association of Community Colleges (NJ1), 2012
In recent months, some legislators, government agency officials, segments of the media, and campus administrators have called attention to perceived and proven instances of abuse of the federal student financial assistance programs. Concerns have focused on students enrolling in courses primarily to secure student financial aid funds rather than…
Descriptors: Student Financial Aid, Grants, Federal Aid, Deception
Carr, John; Hilton, Zoe – Children & Society, 2009
In the United Kingdom (UK), the number of convictions for offences related to child abuse images fell back following the police investigation dubbed "Operation Ore", but have still continued at levels unimaginable only 10 years ago. However, while government and the internet industry deserve credit for the steps they have taken to reduce…
Descriptors: Child Abuse, Industry, Foreign Countries, Internet
Bartik, Timothy J. – W. E. Upjohn Institute for Employment Research, 2011
Early childhood programs, if designed correctly, pay big economic dividends down the road because they increase the skills of their participants. And since many of those participants will remain in the same state or local area as adults, the local economy benefits: more persons with better skills attract business, which provides more and better…
Descriptors: Economic Development, Early Childhood Education, Young Children, Cost Effectiveness
Brandon, Paul R.; Smith, Nick L.; Grob, George F. – American Journal of Evaluation, 2012
In 1997, American Evaluation Association member George Grob, now retired from the U.S. Department of Health and Human Services (HHS) and currently President of the Center for Public Program Evaluation, made a testimony on Medicare home health care fraud and abuse before the U.S. Senate Special Committee on Aging. The occasion was to announce the…
Descriptors: Human Services, Evaluators, Investigations, Program Evaluation
Gnage, Marie Foster; Dziagwa, Connie; White, Dave – Community College Journal of Research and Practice, 2009
West Virginia University at Parkersburg uses a two-way emergency system as a baseline for emergency communications. The college has found that such a system, a key component of its safety and crisis management plan, can be integrated with other communication initiatives to provide focused security on the campus.
Descriptors: School Safety, Crisis Management, Communications, Community Colleges
Altizer, Andy – Campus Law Enforcement Journal, 2008
Conducting exercises provides a critical bridge between the theory of an Emergency Action Plan and its effective implementation. When conducted properly, exercises can fill the gap between training and after-action review to close the preparedness loop--before an actual emergency occurs. Often exercises are planned and conducted on campus based on…
Descriptors: Law Enforcement, Crime Prevention, Emergency Programs, Police
New Jersey Department of Education, 2015
This report presents information provided by New Jersey public schools for the 2014-15 school year on incidents of violence; vandalism; weapon offenses; substance offenses; and harassment, intimidation, and bullying (HIB). The information is presented annually by the New Jersey Department of Education (NJDOE) to the Governor and Legislature to…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Taylor, Kelley R. – Principal Leadership, 2009
A 15-year-old girl is arrested on child pornography charges for using her cell phone to send nude photos of herself to classmates. A young boy is put on probation after sending an explicit photo of his genitals to a girl's cell phone. Two high school cheerleaders are suspended from the squad after nude photos of them are sent by cell phone to the…
Descriptors: School Safety, Law Enforcement, Pornography, Computer Mediated Communication
Roman, Harry T. – Technology Teacher, 2009
All too often, one reads about high-speed police chases in pursuit of stolen cars that result in death and injury to people and innocent bystanders. Isn't there another way to accomplish the apprehension of the thieves that does not put people at such great risk? This article presents a classroom challenge to use technology to remotely shutdown…
Descriptors: Teaching Methods, Information Technology, Computer Uses in Education, Educational Technology
McKay, Richard – Community & Junior College Libraries, 2008
Ongoing theft from library patrons may be the work of a determined thief, one who will not be deterred by the crimeproofing techniques that often stop less committed criminals. This type of theft can be deterred when the library staff makes their patrons aware that successful deterrence depends on them not abandoning their valuables. Other staff…
Descriptors: Library Services, Library Materials, Antisocial Behavior, Books
Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A. – Information Systems Education Journal, 2010
This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…
Descriptors: Information Systems, Information Security, Accreditation (Institutions), Educational Innovation
Sturgeon, Julie – T.H.E. Journal, 2008
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space.…
Descriptors: Computer Software, Computers, Internet, School Safety