NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 121 to 135 of 405 results Save | Export
Consortium for School Networking (NJ1), 2011
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Descriptors: Safety, Laws, School Districts, Internet
Barrett, G. Jaia, Ed. – Association of Research Libraries, 2008
ARL is the bimonthly report on research library issues and actions from ARL (Association of Research Libraries), CNI (Coalition of Networked Information), and SPARC (Scholarly Publishing and Academic Resources Coalition). ARL reports on current issues of interest to academic and research library administrators, staff, and users; higher education…
Descriptors: Research Libraries, Information Policy, Academic Libraries, Electronic Publishing
Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian – RAND Corporation, 2009
This briefing paper captures the key findings and recommendations of a study commissioned by the Joint Information Systems Committee on aspects of the strategic commitment of institutions to repository sustainability. This project, labelled EMBRACE (EMBedding Repositories And Consortial Enhancement), is aimed at enhancing the functionality,…
Descriptors: Higher Education, Information Systems, Electronic Libraries, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Shahabuddin, Syed – International Journal of Teaching and Learning in Higher Education, 2009
Plagiarism sometimes creates legal and ethical problems for students and faculty. It can have serious consequences. Fortunately, there are ways to stop plagiarism. There are many tools available to detect plagiarism, e.g. using software for detecting submitted articles. Also, there are many ways to punish a plagiarist, e.g. banning plagiarists…
Descriptors: Plagiarism, Periodicals, Writing for Publication, Faculty Publishing
Peer reviewed Peer reviewed
Direct linkDirect link
Sturges, Paul – Australian Academic & Research Libraries, 2009
The first decade of the twenty first century has seen a growing interest and intellectual debate within the information professions, focusing on issues where an ethical dimension predominates. This paper provides an overview of codes of practice, published literature, conference proceedings and educational programs that focus on information…
Descriptors: Conferences (Gatherings), Ethics, Best Practices, Literature Reviews
Underwood, Linda – School Library Monthly, 2009
It seems that fear of Web 2.0 is in full force. There are two concerns that resulted in a national panic concerning Internet Web 2.0 tools: pedophiles luring children via the Internet and corruption of youths through exposure to hard-core pornography or other vile material. Administrators, no doubt, are thinking in terms of saving themselves from…
Descriptors: Freedom of Speech, Internet, School Libraries, Media Specialists
Peer reviewed Peer reviewed
Direct linkDirect link
Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T. – Journal of Marketing Education, 2010
An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…
Descriptors: Business Administration Education, Business Education, Information Policy, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Marcum, Tanya M.; Perry, Sandra J. – College and University, 2010
Those who come in contact with students at the post-secondary level face a myriad of potential legal challenges in their interactions with students and others. All members of the academic community should be familiar with the more common legal issues and to plan accordingly to avoid future problems. This article explores FERPA in the classroom,…
Descriptors: Legal Problems, Academic Accommodations (Disabilities), Professional Development, Legal Responsibility
Parry, Marc – Chronicle of Higher Education, 2009
If you work at a community college that teaches cybersecurity, it pays to be located in the backyard of a spy agency. Just don't ask Kelly A. Koermer, administrator of the Anne Arundel Community College, what's inside those dark towers at Fort Meade. She points out other highlights of the restricted region: an employees-only exit off the highway,…
Descriptors: Community Colleges, Internet, Computer Security, National Security
Peer reviewed Peer reviewed
Direct linkDirect link
Thur, Victoria L. – Journal of Access Services, 2009
The U.S. government has sought to restrict the freedoms of its citizens in times of war from World War I to the present. The banners of fear, war, terrorism, and nationwide security placed constitutional rights under a renewed scrutiny. This paper will focus on the passage of laws that restrict academic and intellectual freedoms during war, and…
Descriptors: Intellectual Freedom, Access to Information, National Security, Academic Freedom
Rampell, Catherine – Chronicle of Higher Education, 2008
The high prices of textbooks, which are approaching $1,000 per year for an average student, have those students and their professors crying for mercy. Flat World Knowledge, a new digital-textbook publisher, has the answer to this problem. Starting next year, the publisher will offer online, peer-reviewed, interactive, user-editable textbooks, free…
Descriptors: Textbook Publication, Electronic Publishing, Access to Information, Information Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Parry, Marc – Chronicle of Higher Education, 2009
As the federal government prepares to pour billions of stimulus dollars into increased broadband Internet access, colleges are trying to claim much of the money and shape the emerging national networking policy. Their focus is $4.7-billion that will be doled out under a new grant program administered by a small Commerce Department agency called…
Descriptors: Access to Information, Telecommunications, Internet, Grants
Peer reviewed Peer reviewed
Direct linkDirect link
Iannacci, Federico; Cornford, Tony; Cordella, Antonio; Grillo, Francesco – Evaluation Review, 2009
In contrast to the prevailing image of monitoring systems as technical systems, it is proposed that they should rather be conceived of as social endeavors at exchanging information. Drawing on the monitoring and evaluation framework of Cornford, Doukidis, and Forster, the concept of information agreement is suggested as a way of assessing the…
Descriptors: Evaluation Methods, Foreign Countries, Information Policy, Information Systems
Western Interstate Commission for Higher Education, 2012
WICHE (the Western Interstate Commission for Higher Education) is a regional, nonprofit organization. WICHE and its 15 member states work to improve access to higher education and ensure student success. Its student exchange programs, regional initiatives, and its research and policy work allow it to assist constituents throughout the West and…
Descriptors: Higher Education, Nonprofit Organizations, Program Administration, Student Exchange Programs
Pages: 1  |  ...  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  ...  |  27