Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 17 |
Since 2016 (last 10 years) | 39 |
Since 2006 (last 20 years) | 162 |
Descriptor
Source
Author
Fain, Terry | 5 |
Sehgal, Amber | 5 |
Turner, Susan | 5 |
Schneider, Tod | 4 |
Stover, Del | 4 |
Descy, Don E. | 3 |
Kennedy, Mike | 3 |
Ashford, Tina | 2 |
Carlson, Scott | 2 |
Carr, Joetta L. | 2 |
Donovan, Erin | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 46 |
Administrators | 33 |
Teachers | 23 |
Policymakers | 18 |
Community | 6 |
Media Staff | 4 |
Parents | 2 |
Researchers | 2 |
Support Staff | 2 |
Students | 1 |
Location
California | 15 |
New Jersey | 13 |
United States | 8 |
Florida | 6 |
United Kingdom | 5 |
Virginia | 5 |
Australia | 4 |
Canada | 4 |
Michigan | 4 |
Minnesota | 4 |
Oregon | 4 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
General Educational… | 1 |
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Plummer, Eric S. – Campus Law Enforcement Journal, 2008
According to the U.S. Department of Justice (www.usdoj.gov), Community Policing is defined as: "The focus on crime and social disorder through the delivery of police services that includes aspects of traditional law enforcement, as well as prevention, problem-solving, community engagement, and partnerships. The community policing model balances…
Descriptors: Crime, Police, Problem Solving, Law Enforcement
Goodman, Wendy; Leggett, Janice; Weston, Clive; Phillips, Sarah; Steward, John – British Journal of Learning Disabilities, 2008
This paper reports on the process of helping offenders, and those at risk of offending, with mild learning disabilities, understand their steps to offending. The four-stage model of sexual offending provides a framework to enable participants and facilitators to understand the individuals' offending, in particular the steps or stages that lead to…
Descriptors: Mild Mental Retardation, Males, At Risk Persons, Criminals
Pricer, Wayne F. – Community College Enterprise, 2008
In the wake of the horrific shootings at Virginia Tech and Northern Illinois University, many colleges and universities have begun to reexamine and reevaluate classroom management strategies and practices. Several institutions have taken additional steps to try to deal with the issue of physical safety in the classroom. This article presents an…
Descriptors: Classroom Techniques, Annotated Bibliographies, Classroom Environment, School Safety
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services
Sammons, Gregory – Campus Law Enforcement Journal, 2008
Many campus law enforcement administrators reach a point where they need to request additional staff. Unless the department is awash in extra funding or is in the wake of a major incident that brought significant attention to current manpower, they're likely fighting an uphill battle for growth. The effectiveness of formulas that analyze the size…
Descriptors: Law Enforcement, Benchmarking, Predictor Variables, Campuses
Mejia, Robin – Chronicle of Higher Education, 2008
The need for colleges to graduate students who understand computer security is growing. The Internet Crime Complaint Center, a partnership of the FBI; the National White Collar Crime Center; and the Bureau of Justice Assistance, in the Department of Justice, reported more than 90,000 crimes in 2007, with reported financial losses of almost…
Descriptors: College Students, Crime Prevention, Computer Security, Internet
Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention, 2008
Because alcohol and other drugs are involved in most acts of violence on campus, college and university administrators are under increasing pressure to acknowledge this connection and reduce alcohol consumption on campus. But because alcohol alone does not cause violence, campuses must also address other contributing factors. Since research has…
Descriptors: Violence, Rape, Sexual Abuse, Crime
Winder, Belinda; Brunsden, Vivienne; Farnsworth, Bill – Psychology Teaching Review, 2007
In this article, the authors comment on Hugh Foot's article on student research and ethics ["Psychology Teaching Review," 12(1), 82-86 (2006)] The authors agree with Foot that there is no case for accepting less stringent ethical criteria when the researcher is a student. However, they argue that greater attention and more stringent measures…
Descriptors: Undergraduate Students, Student Research, Qualitative Research, Confidentiality
O'Brien, Sandra Pavelka – Prevention Researcher, 2007
A modern-day movement is transforming the way that communities and justice systems think about and respond to crime and wrongful occurrences. This response implements a holistic continuum of services, providing for prevention, intervention, diversion, commitment, probation, reentry, and aftercare. This approach--known as restorative justice--seeks…
Descriptors: Equal Protection, Justice, Crime Prevention, Criminal Law
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
New Jersey Department of Education, 2013
The Commissioner's annual report provides the Governor and Legislature with information reported by school districts concerning incidents of serious student misconduct grouped into the following five major reporting categories: violence; vandalism; harassment, intimidation and bullying (HIB); weapons; and substance abuse. An analysis of trends…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Borja, Rhea R. – Education Week, 2006
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
Descriptors: Computer Security, Computer Networks, Students, Crime
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…
Descriptors: Computers, Computer Security, Crime Prevention, Internet
Conde, Carlos D. – Education Digest: Essential Readings Condensed for Quick Review, 2007
Illegal migrants are a nonentity in the United States, and, to a certain extent, many prefer it that way. They exist in society's netherworld, living under their own code of survival by whatever means they can, since the alternatives are less inviting. Mostly, they struggle. People take advantage of them at every opportunity because they are…
Descriptors: Migrants, Slavery, Labor Force, Undocumented Immigrants