NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 151 to 165 of 903 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hvidston, David J.; Hvidston, Brynn A.; Range, Bret G.; Harbour, Clifford P. – NASSP Bulletin, 2013
Cyberbullying has been identified by school leaders and researchers as one of the most serious adverse consequences of incorporating information technology into the classroom. This article examines the legal status of cyberbullying by conducting an analysis of selected federal appellate court opinions. This analysis identifies a set of legal…
Descriptors: Bullying, Principals, Mass Media Effects, Court Litigation
Peer reviewed Peer reviewed
Direct linkDirect link
Bruno, Walter – Academic Questions, 2013
There has been a long culture war over the validity of "Wikipedia" for research. Many university departments banned it as a primary source starting around 2007, but many others still allow it as a heuristic prompt. Certainly, one knows that students are still going to "Wikipedia" and dabbling in it. This reflects a recent gain in "Wikipedia"…
Descriptors: Feminism, Web 2.0 Technologies, Primary Sources, Censorship
Lavender, Anthony L. – ProQuest LLC, 2013
The idea of Open Government is an extension of the Electronic Government Act of 2002 which addresses the accessibility, usability, and preservation of government information. The concept of Open Government has evolved into the open government directive that mandates Executive Departments and Agencies to become more open and transparent while…
Descriptors: Web 2.0 Technologies, Federal Government, Housing, Public Agencies
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Lamlert, Wariya – International Association for Development of the Information Society, 2014
In this society of digital environment, to keep pace with the technological change that causes the difficulties of information access together with royalty fees remunerated for making use of copyrighted materials, Creative Commons (CC) license is introduced. However, debates on the issues of copyright and CC license have widely arisen. This…
Descriptors: Copyrights, Certification, Access to Information, Information Utilization
Levin, Douglas – Foundation for Excellence in Education (ExcelinEd), 2015
The last decade has seen many exciting innovations in education. Educators have developed new instructional models that accelerate and deepen student learning by tailoring instruction to each student's individual needs, skills, and interests. In recent years nearly every state in the nation has responded by considering new student data privacy…
Descriptors: Privacy, Elementary Secondary Education, Information Policy, Student Records
Peer reviewed Peer reviewed
Direct linkDirect link
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Pazdrowski, Tomasz – ProQuest LLC, 2013
Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…
Descriptors: Innovation, Resistance to Change, Internet, Adoption (Ideas)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maiwald, Matthias; Harrington, Kathy – Australian Universities' Review, 2012
Intellectual property rights have various facets. The best-known one is copyright, enabling the owner to legally utilise intellectual materials. However, there is a separate set of legal entitlements, termed moral intellectual property rights. The purpose of these is to prevent false attribution, damage to an author's reputation and some forms of…
Descriptors: Foreign Countries, Copyrights, Plagiarism, Instructional Materials
Data Quality Campaign, 2016
Every state can create secure, robust linkages between early childhood and K-12 data systems, and effectively use the information from these linkages to implement initiatives to support programs and children, answer key policy questions, and be transparent about how the state's early childhood investments prepare students for success in school and…
Descriptors: Early Childhood Education, Elementary School Curriculum, Data, Program Implementation
Data Quality Campaign, 2014
This publication provides an overview of the current federal opportunities to help states advance their data-related activities. Although not exhaustive, this list provides a starting point for federal policymakers to support states' work in this area.
Descriptors: Federal Aid, Data Collection, Data Processing, Information Management
Wake County Public School System, 2015
This handbook was produced as a resource for students and parents to explain the policies, rules, and regulations governing all students in the Wake County Public School System. Numbers that appear in some portions of the handbook refer to specific Board of Education policies. In some instances the entire policy is cited; at other times, only the…
Descriptors: Public Schools, Parent Materials, Guides, Governance
Gentile, Mark – Education Digest: Essential Readings Condensed for Quick Review, 2012
Today, corporate users are not the only ones rapidly embracing mobile tablets for daily use--this transition has spilled over into the education sector. Schools have begun incorporating mobile devices such as iPads and other tablets into their curriculum. While this trend brings new and exciting educational opportunities, administrators and…
Descriptors: Handheld Devices, Classroom Environment, Classroom Techniques, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Snowman, Ann Mackay – Journal of Access Services, 2013
Every U.S. state and the District of Columbia has a law on the books that protects a library borrower's privacy, both an ethical and legal obligation of the library. In addition, FERPA further restricts access to users' records. Getting the message across to staff can be a challenge, especially if you employ students or volunteers who may not…
Descriptors: Ethics, Library Services, Confidentiality, Staff Development
Pages: 1  |  ...  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  ...  |  61