NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 211 to 225 of 1,336 results Save | Export
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Diliberti, Melissa; Jackson, Michael; Kemp, Jana – National Center for Education Statistics, 2017
This report presents findings on crime and violence in U.S. public schools, using data from the 2015-16 School Survey on Crime and Safety (SSOCS:2016). First administered in school year 1999-2000 and repeated in school years 2003-04, 2005-06, 2007-08, 2009-10, and 2015-16, SSOCS provides information on school crime-related topics from the…
Descriptors: Crime, Violence, Discipline, School Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, Pamela M. – International Journal of Behavioral Consultation and Therapy, 2013
Treatment of sexual offenders has evolved substantially over the years; various theoretical and practice models of treatment been developed, modified, refined, and proposed over time. The predominant current recommended approach, supported by research, adheres to specific principles of effective correctional intervention, follows a…
Descriptors: Best Practices, Intervention, Correctional Rehabilitation, Institutionalized Persons
Peer reviewed Peer reviewed
Direct linkDirect link
Pickett, Justin T.; Mears, Daniel P.; Stewart, Eric A.; Gertz, Marc – Crime & Delinquency, 2013
In "The Culture of Control: Crime and Social Order in Contemporary Society," David Garland linked contemporary crime control policies and welfare reforms to a cultural formation that he termed the "crime complex of late modernity." According to Garland, once established, the crime complex exerts a contemporaneous effect on…
Descriptors: Crime, Prediction, Welfare Services, Security (Psychology)
Abu Jbara, Ahmed – ProQuest LLC, 2013
Models, created using different modeling techniques, usually serve different purposes and provide unique insights. While each modeling technique might be capable of answering specific questions, complex problems require multiple models interoperating to complement/supplement each other; we call this Multi-Modeling. To address the syntactic and…
Descriptors: Models, Problem Solving, Research Methodology, Research Problems
Domain, Melinda Willoughby – ProQuest LLC, 2014
This qualitative phenomenological study employed narrative inquiry to describe the decision-making processes that Texas school districts followed in enacting firearms policies that allow school employees to carry concealed weapons on district property. Exploration of the lived experiences of eight Texas superintendents in such schools contributed…
Descriptors: Decision Making, School Districts, Weapons, Gun Control
Peer reviewed Peer reviewed
Direct linkDirect link
Schweer, Jen Luettel; Heather, Katie; Kay, Kathryn; Stewart, K. Leigh; Kovach, Laura – NASPA Journal About Women in Higher Education, 2012
R.U. Ready? at Georgetown University is an annual sexual assault awareness event that incorporates peer education and resources with opportunities for students, staff, and faculty to dialogue about providing bystander intervention throughout the campus community. Beyond dialogue, participants learn about student activism and the resources and…
Descriptors: Peer Teaching, College Students, Consciousness Raising, Peer Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Mejia, Pamela; Cheyne, Andrew; Dorfman, Lori – Journal of Child Sexual Abuse, 2012
News media coverage of child sexual abuse can help policymakers and the public understand what must be done to prevent future abuse, but coverage tends to focus on extreme cases. This article presents an analysis of newspaper coverage from 2007 to 2009 to describe how the daily news presents and frames day-to-day stories about child sexual abuse.…
Descriptors: Sexual Abuse, Child Abuse, Prevention, News Reporting
Sellke, Sarah H. – ProQuest LLC, 2010
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
Descriptors: Internet, Computer Security, Crime Prevention, Technical Support
Peer reviewed Peer reviewed
Direct linkDirect link
Christensen, M. Candace – NASPA Journal About Women in Higher Education, 2015
This study explores the experiences of male college students who participated in a theatre-based, peer-education, sexual assault prevention presentation. The program was established through the use of Pedagogy of the Oppressed and Theatre of the Oppressed, as well as multicultural feminist theory and approaches. These models emphasize subverting…
Descriptors: Males, College Students, Violence, Prevention
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Walsh, Kerryann; Berthelsen, Donna; Nicholson, Jan M.; Brandon, Leisa; Stevens, Judyann; Rachele, Jerome N. – Oxford Review of Education, 2013
The past four decades have seen increasing public and professional awareness of child sexual abuse. Congruent with public health approaches to prevention, efforts to eliminate child sexual abuse have inspired the emergence of prevention initiatives which can be provided to all children as part of their standard school curriculum. However,…
Descriptors: Sexual Abuse, Child Abuse, Prevention, School Policy
Rivero, David A.; Colombo, Michael – Campus Law Enforcement Journal, 2010
All aspects of police work are challenging both professionally and personally. Police officers are accustomed to shift work, mandatory overtime, schedule adjustments for training, holidays and disasters, recalls and required off-duty court appearances. Police officers traditionally work eight hours per day, five day weeks (otherwise known as a 5/8…
Descriptors: Police, Law Enforcement, Higher Education, Campuses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smallbone, Stephen; Rayment-Mchugh, Susan; Smith, Dimity – International Journal of Behavioral Consultation and Therapy, 2013
In this article we reflect on developments in our thinking and practice concerning youth sexual offending. We put the case that context is critical to understanding and responding to the problem, and accordingly that a social ecological model provides the most suitable conceptual and practice framework for clinical efforts with this population. We…
Descriptors: Sexual Abuse, Delinquency, Youth, Recidivism
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Crime Prevention through Environmental Design (CPTED) 101 applies to both new and existing schools and is built on three simple concepts: natural surveillance, natural access control, and territoriality. If a school's layout seems unsafe, adopting a few CPTED fundamentals may help make it significantly safer. This paper offers some tips for making…
Descriptors: School Security, Crime Prevention, Educational Environment, Educational Facilities
Pages: 1  |  ...  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  ...  |  90