NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 226 to 240 of 903 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Andergassen, Monika; Guerra, Victor; Ledermüller, Karl; Neumann, Gustaf – International Journal of Mobile and Blended Learning, 2013
Didactical advantages of audience response systems (ARS) have been discussed extensively ever since they have been used in classes. However, conventional ARS bear some drawbacks, such as requiring specific hardware, generating costs (text messaging based and web service fees) and creating a dependency on external hosts. In this paper we present a…
Descriptors: Foreign Countries, Web Browsers, Handheld Devices, Audience Response Systems
Koss, Judith C. – School Library Journal, 2009
Is it legal to copy a DVD onto a school district's server? As general counsel for a company that publishes and distributes educational videos and sells video-on-demand servers that digitally deliver them to the classroom, the author gets that question from educators all the time. And the answer is: it depends. If one is dealing with copyrighted…
Descriptors: Copyrights, Reprography, Video Technology, Use Studies
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Peer reviewed Peer reviewed
Direct linkDirect link
Jameson, Daphne A. – Business Communication Quarterly, 2011
When Starwood Hotels charged Hilton Hotels with industrial espionage, the case hinged on an employment agreement that two executives had violated. The rhetoric of the employment agreement contrasted greatly with that of the corporation's own code of business conduct. Whereas the private agreement stressed narrow self-interest, the public code…
Descriptors: Housing, Tourism, Business, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Emmeline – Journal of Education Policy, 2011
The use of CCTV in schools is now commonplace in the UK. It is estimated that 85% of all UK secondary schools currently have CCTV systems in operation. The introduction of the Data Protection Act 1998 (DPA) (enacted in March 2000) meant that for the first time CCTV had direct legislation governing its use in the UK. This paper attempts to apply…
Descriptors: Foreign Countries, School Safety, Safety Equipment, Law Enforcement
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hamblin, David J.; Phoenix, David A. – Journal of Higher Education Policy and Management, 2012
There are increasing demands for higher levels of data assurance in higher education. This paper explores some of the drivers for this trend, and then explains what stakeholders mean by the concept of data assurance, since this has not been well defined previously. The paper captures insights from existing literature, stakeholders, auditors, and…
Descriptors: Higher Education, Educational Technology, Stakeholders, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Valeri, Andy – Policy Futures in Education, 2012
This article outlines how providing accessible transparency to information controlled by institutions of power and suppressed from public view is both similar in purpose to, as well as an essential component of, the pedagogical processes promoted by Paulo Freire, which are necessary for the establishment of a truly just and non-oppressive society.…
Descriptors: Access to Information, Information Policy, Freedom of Speech, Censorship
Peer reviewed Peer reviewed
Direct linkDirect link
Ramsay, Judith; Renaud, Karen – Behaviour & Information Technology, 2012
One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…
Descriptors: Evidence, Electronic Mail, Interviews, Foreign Countries
Parry, Marc – Chronicle of Higher Education, 2009
Distance educators won't have to become FBI-style investigators, installing cameras in the homes of online students and scanning fingerprints to ensure that people are who they say they are. At least not yet. The recently reauthorized Higher Education Opportunity Act requires accreditors to monitor steps colleges take to verify that an enrolled…
Descriptors: Distance Education, Privacy, Online Courses, Federal Regulation
Lewis, Harry – Chronicle of Higher Education, 2009
Documents from the Army during World War II arrived with the censor's approval stamp, certifying that no harm would come to the nation if those depictions of life at the front fell into enemy hands. That was the censorship of another time. Everyone understood why it was important and knew that the government needed to control the communication…
Descriptors: Censorship, Internet, Intellectual Freedom, Access to Information
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Dezuanni, Michael Luigi; Miles, Prue – Journal of Media Literacy Education, 2011
The 5th World Summit on Media for Children and Youth held in Karlstad, Sweden in June 2010 provided a unique media literacy experience for approximately thirty young people from diverse backgrounds through participation in the Global Youth Media Council. This article focuses on the Summit's aim to give young people a "voice" through…
Descriptors: Media Literacy, Foreign Countries, Young Adults, Intercultural Programs
Pereira, Sara; Pinto, Manuel – Journal of Media Literacy Education, 2011
Empowering children for a critical and judicious use and consumption of media is a main objective of media literacy. This paper aims to examine the range of television programs available for children in Portugal through a comparative analysis of the programming for children broadcast by the four Portuguese terrestrial channels (RTP1, RTP2, SIC and…
Descriptors: Media Literacy, Foreign Countries, Content Analysis, Educational Television
Pages: 1  |  ...  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  ...  |  61