NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 121 to 135 of 420 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dinkes, Rachel; Kemp, Jana; Baum, Katrina – National Center for Education Statistics, 2009
"Indicators of School Crime and Safety: 2008" provides the most recent national indicators on school crime and safety. The information presented in this report is intended to serve as a reference for policymakers and practitioners so that they can develop effective programs and policies aimed at violence and school crime prevention. The…
Descriptors: Crime, School Safety, Violence, Crime Prevention
Willard, Nancy – District Administration, 2008
Two Oregon students create a racist profile on a social networking site, with cartoons about lynching and racist language. Other students link to the profile and post ugly, racist comments. Teachers report that many of the school's minority students are frightened. In another instance, several high school students create a "We Hate…
Descriptors: Internet, Minority Groups, Social Networks, Web Sites
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lekes, Natasha – New Directions for Youth Development, 2007
This article describes the Leave Out Violence (LOVE) program, which was founded in 1993 by Twinkle Rudberg many years after her husband's murder by a fourteen-year-old mugger in downtown Montreal. Realizing that the young person responsible for taking her husband's life was also a victim of violence, Rudberg was inspired to create a violence…
Descriptors: Violence, Crime Prevention, Social Action, Leadership Training
Wren, Andrew; Spicer, Brad – American School & University, 2007
The use of surveillance cameras in schools is not new, but just about everything involved with the technology and the way it is used is new. Surveillance equipment once was a precautionary system, relegated to the corner, where it gathered dust until an incident took place, then administrators would painstakingly roll out the video to investigate…
Descriptors: Video Equipment, Photography, School Security, Crime Prevention
Dillon, Naomi – Education Digest: Essential Readings Condensed for Quick Review, 2007
More and more families are willing to go to any lengths to get their children into the right schools, even if it means crossing the line between right and wrong. Boundary hopping--falsifying residency status to attend a particular school--has been around for years. In a handful of states, it has been alleviated by open enrollment, choice programs,…
Descriptors: Open Enrollment, Educational Opportunities, Cheating, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Wilkinson, Reginald A.; Rhine, Edward E.; Henderson-Hurley, Martha – Journal of Correctional Education, 2006
In 2002, the Ohio Department of Rehabilitation and Correction (DRC) published The Ohio Plan for Productive Offender Reentry and Recidivism Reduction. The document listed forty-four recommendations designed to contribute significantly to the development of a reentry transition system that providing a seamless service and program delivery beginning…
Descriptors: Correctional Rehabilitation, Correctional Institutions, Recidivism, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Carr, Joetta L.; Ward, Robert L. – NASPA Journal, 2006
In 1999, the American College Health Association (ACHA) adopted a position statement for the Association that addresses acts of violence, bias, and other violations of human rights that have been occurring all too often within or adjacent to college communities. The purpose of this ACHA White Paper is to confront this serious college health issue…
Descriptors: Crime, Violence, College Environment, Crime Prevention
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Khamisa, Azim – Reclaiming Children and Youth: The Journal of Strength-based Interventions, 2006
After a young boy killed Azim's college-aged son, the author left his career in investment banking to build a powerful program of violence prevention. Azim joined with the grandfather of his son's killer to form the Tariq Khamisa Foundation which brings messages of forgiveness, reconciliation, and restorative justice to schools, communities, and…
Descriptors: Violence, Crime Prevention, Program Design, Death
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Peer reviewed Peer reviewed
Petrosino, Anthony – Canadian Journal of Program Evaluation, 2000
Defines causal-model evaluation and uses an example from the crime prevention literature to contrast this approach with traditional evaluations. Discusses benefits and limitations of the approach, as well as other issues. (SLD)
Descriptors: Causal Models, Crime Prevention, Evaluation Methods
Goldsborough, Reid – Black Issues in Higher Education, 2004
Identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. People do get scammed. Phishing messages that appear to be sent by trusted companies dupe 3 percent of the people who receive…
Descriptors: Credit (Finance), Internet, Computer Security, Crime Prevention
Maxwell, Lesli A. – Education Week, 2007
Coming just four days before the anniversary of the Columbine school shootings, the mass slayings by a student gunman at Virginia Polytechnic Institute last week revived vexing questions and raised familiar fears for educators across the country who grapple daily with ensuring the safety of their students and staffs. The April 16 killings provoked…
Descriptors: Crisis Management, School Safety, Student Behavior, School Security
Stover, Del – Education Digest: Essential Readings Condensed for Quick Review, 2006
It is absolutely critical that high school games be organized in the safest way possible--both for the students, the staff who are directly involved and for all the spectators who watch these games. School officials have become vigilant with safety measures as a string of violent incidents has occurred in several school athletic events across the…
Descriptors: Athletics, School Safety, Violence, High Schools
Pages: 1  |  ...  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  ...  |  28