NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 226 to 240 of 905 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Stauffer, Sterling; Heath, Melissa Allen; Coyne, Sarah Marie; Ferrin, Scott – Psychology in the Schools, 2012
Recent meta-analyses indicate that bully prevention programs produce minimal change in student behavior. This study examined 66 high school teachers' perceptions regarding the effect of cyberbullying on students, which intervening strategies teachers would use when dealing with cyberbullying, and which prevention strategies would assist in…
Descriptors: Prevention, Intervention, Student Behavior, Fidelity
Peer reviewed Peer reviewed
Direct linkDirect link
Losh, Elizabeth; Jenkins, Henry – Knowledge Quest, 2012
Participatory culture has many mechanisms to support peer-to-peer learning as young people enter interest-driven and friendship-driven networks. In this article, the authors argue that school librarians can help bridge the gap between the excitement of having students experiment with new forms of social learning and new digital-media practices,…
Descriptors: Intellectual Freedom, Access to Information, Public Education, School Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Andergassen, Monika; Guerra, Victor; Ledermüller, Karl; Neumann, Gustaf – International Journal of Mobile and Blended Learning, 2013
Didactical advantages of audience response systems (ARS) have been discussed extensively ever since they have been used in classes. However, conventional ARS bear some drawbacks, such as requiring specific hardware, generating costs (text messaging based and web service fees) and creating a dependency on external hosts. In this paper we present a…
Descriptors: Foreign Countries, Web Browsers, Handheld Devices, Audience Response Systems
Koss, Judith C. – School Library Journal, 2009
Is it legal to copy a DVD onto a school district's server? As general counsel for a company that publishes and distributes educational videos and sells video-on-demand servers that digitally deliver them to the classroom, the author gets that question from educators all the time. And the answer is: it depends. If one is dealing with copyrighted…
Descriptors: Copyrights, Reprography, Video Technology, Use Studies
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Peer reviewed Peer reviewed
Direct linkDirect link
Jameson, Daphne A. – Business Communication Quarterly, 2011
When Starwood Hotels charged Hilton Hotels with industrial espionage, the case hinged on an employment agreement that two executives had violated. The rhetoric of the employment agreement contrasted greatly with that of the corporation's own code of business conduct. Whereas the private agreement stressed narrow self-interest, the public code…
Descriptors: Housing, Tourism, Business, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Emmeline – Journal of Education Policy, 2011
The use of CCTV in schools is now commonplace in the UK. It is estimated that 85% of all UK secondary schools currently have CCTV systems in operation. The introduction of the Data Protection Act 1998 (DPA) (enacted in March 2000) meant that for the first time CCTV had direct legislation governing its use in the UK. This paper attempts to apply…
Descriptors: Foreign Countries, School Safety, Safety Equipment, Law Enforcement
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hamblin, David J.; Phoenix, David A. – Journal of Higher Education Policy and Management, 2012
There are increasing demands for higher levels of data assurance in higher education. This paper explores some of the drivers for this trend, and then explains what stakeholders mean by the concept of data assurance, since this has not been well defined previously. The paper captures insights from existing literature, stakeholders, auditors, and…
Descriptors: Higher Education, Educational Technology, Stakeholders, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Valeri, Andy – Policy Futures in Education, 2012
This article outlines how providing accessible transparency to information controlled by institutions of power and suppressed from public view is both similar in purpose to, as well as an essential component of, the pedagogical processes promoted by Paulo Freire, which are necessary for the establishment of a truly just and non-oppressive society.…
Descriptors: Access to Information, Information Policy, Freedom of Speech, Censorship
Peer reviewed Peer reviewed
Direct linkDirect link
Ramsay, Judith; Renaud, Karen – Behaviour & Information Technology, 2012
One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…
Descriptors: Evidence, Electronic Mail, Interviews, Foreign Countries
Parry, Marc – Chronicle of Higher Education, 2009
Distance educators won't have to become FBI-style investigators, installing cameras in the homes of online students and scanning fingerprints to ensure that people are who they say they are. At least not yet. The recently reauthorized Higher Education Opportunity Act requires accreditors to monitor steps colleges take to verify that an enrolled…
Descriptors: Distance Education, Privacy, Online Courses, Federal Regulation
Lewis, Harry – Chronicle of Higher Education, 2009
Documents from the Army during World War II arrived with the censor's approval stamp, certifying that no harm would come to the nation if those depictions of life at the front fell into enemy hands. That was the censorship of another time. Everyone understood why it was important and knew that the government needed to control the communication…
Descriptors: Censorship, Internet, Intellectual Freedom, Access to Information
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Pages: 1  |  ...  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  ...  |  61