Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 30 |
Since 2006 (last 20 years) | 191 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Policymakers | 13 |
Practitioners | 12 |
Media Staff | 10 |
Administrators | 8 |
Teachers | 7 |
Parents | 5 |
Counselors | 2 |
Students | 2 |
Researchers | 1 |
Location
United States | 15 |
Canada | 14 |
Australia | 8 |
United Kingdom | 8 |
California | 5 |
European Union | 4 |
Connecticut | 3 |
New Zealand | 3 |
Russia | 3 |
Virginia | 3 |
Florida | 2 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Hamblin, David J.; Phoenix, David A. – Journal of Higher Education Policy and Management, 2012
There are increasing demands for higher levels of data assurance in higher education. This paper explores some of the drivers for this trend, and then explains what stakeholders mean by the concept of data assurance, since this has not been well defined previously. The paper captures insights from existing literature, stakeholders, auditors, and…
Descriptors: Higher Education, Educational Technology, Stakeholders, Quality Assurance
Valeri, Andy – Policy Futures in Education, 2012
This article outlines how providing accessible transparency to information controlled by institutions of power and suppressed from public view is both similar in purpose to, as well as an essential component of, the pedagogical processes promoted by Paulo Freire, which are necessary for the establishment of a truly just and non-oppressive society.…
Descriptors: Access to Information, Information Policy, Freedom of Speech, Censorship
Parry, Marc – Chronicle of Higher Education, 2009
Distance educators won't have to become FBI-style investigators, installing cameras in the homes of online students and scanning fingerprints to ensure that people are who they say they are. At least not yet. The recently reauthorized Higher Education Opportunity Act requires accreditors to monitor steps colleges take to verify that an enrolled…
Descriptors: Distance Education, Privacy, Online Courses, Federal Regulation
Lewis, Harry – Chronicle of Higher Education, 2009
Documents from the Army during World War II arrived with the censor's approval stamp, certifying that no harm would come to the nation if those depictions of life at the front fell into enemy hands. That was the censorship of another time. Everyone understood why it was important and knew that the government needed to control the communication…
Descriptors: Censorship, Internet, Intellectual Freedom, Access to Information
Dezuanni, Michael Luigi; Miles, Prue – Journal of Media Literacy Education, 2011
The 5th World Summit on Media for Children and Youth held in Karlstad, Sweden in June 2010 provided a unique media literacy experience for approximately thirty young people from diverse backgrounds through participation in the Global Youth Media Council. This article focuses on the Summit's aim to give young people a "voice" through…
Descriptors: Media Literacy, Foreign Countries, Young Adults, Intercultural Programs
Hart, Kevin – CURRENTS, 2010
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Descriptors: Higher Education, Computer Security, Barriers, Confidentiality
Hughes, Stephanie; Keller, Eileen Weisenbach; Hertz, Giles T. – New Directions for Institutional Research, 2010
In recent years, colleges and universities have faced a new challenge. While there has been a movement underway on college campuses to increase the safety of a wide range of university constituents through criminal background checks (CBCs), in most cases this movement has failed to include CBCs of foreign faculty and student populations. The…
Descriptors: Higher Education, Campuses, Crime, Background
Howard, Jennifer – Chronicle of Higher Education, 2009
Senior scholars, the A-list of academic publishing, seem to submit fewer unsolicited manuscripts to traditional humanities journals than they used to. The journal has become, with very few exceptions, the place where junior and midlevel scholars are placing their work. Technology and changing habits have called into question the nature of the…
Descriptors: Periodicals, Internet, Humanities, Influence of Technology
Demski, Jennifer – Campus Technology, 2010
A downturn in the economic climate and an upturn in the technological climate might be higher education IT's "perfect storm." The confluence of budget cuts with the increased reliance on technology in almost all disciplines and administrative areas has put enormous pressure on campus IT leaders to pinpoint and fund tech services that achieve…
Descriptors: Higher Education, Campuses, Information Technology, Economic Impact
Dark, Melissa J.; McPherson, Clewin; Troutner, Joanne – Learning & Leading with Technology, 2008
Over the last year, the number of reported cases of confidential information lost because of stolen laptops, lost USB flash drives, misplaced PDAs, and simple human error has significantly increased. These trends have school districts concerned with issues of violating private information. Laws such as the Family Educational Rights and Privacy Act…
Descriptors: Confidentiality, School Districts, Educational Practices, Information Policy
Bruno, Holly Elissa – Exchange: The Early Childhood Leaders' Magazine Since 1978, 2010
Help for educators and administrators may be on the way in the form of "hold harmless" documents that allow for flexibility in enforcing program policies. Having a "No Babysitting policy," and "Hold Harmless" documentation will not stop one's program from being sued. However, with the "No Babysitting policy" and "Hold Harmless" documentation…
Descriptors: Child Caregivers, Child Care, Early Childhood Education, Legal Responsibility
Raths, David – Campus Technology, 2010
Many chief information officers (CIOs) have come to accept and even embrace the role of outsourcers in their portfolio of IT services. In 2009, 47 percent of the 352 CIOs surveyed by the Center for Higher Education Chief Information Officer Studies (CHECS) said they had selectively outsourced some part of the IT function, up from 43 percent the…
Descriptors: Higher Education, Information Technology, Outsourcing, Strategic Planning
Keller, Josh – Chronicle of Higher Education, 2009
The high price of storing and processing data is hurting colleges and universities across the country. In response, some institutions are embracing greener technologies to keep costs down and help the environment. But compared with other industries, colleges and universities have been slow to understand the problem and to adopt energy-saving…
Descriptors: Energy Management, Cost Effectiveness, Information Services, Information Management