Publication Date
In 2025 | 2 |
Since 2024 | 27 |
Since 2021 (last 5 years) | 85 |
Since 2016 (last 10 years) | 165 |
Since 2006 (last 20 years) | 456 |
Descriptor
Source
Author
Fain, Terry | 12 |
Turner, Susan | 12 |
O'Keefe, Garrett J. | 7 |
Schneider, Tod | 6 |
Sehgal, Amber | 6 |
Croddy, Marshall | 5 |
Mears, Daniel P. | 5 |
Smith, Michael Clay | 5 |
Gaustad, Joan | 4 |
Kennedy, Mike | 4 |
Kritsonis, William Allan | 4 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 153 |
Administrators | 92 |
Policymakers | 74 |
Teachers | 57 |
Students | 19 |
Community | 18 |
Researchers | 12 |
Parents | 10 |
Media Staff | 9 |
Support Staff | 3 |
Counselors | 1 |
More ▼ |
Location
California | 47 |
United States | 31 |
Canada | 27 |
Australia | 20 |
New Jersey | 19 |
United Kingdom | 18 |
New York | 17 |
Florida | 16 |
Virginia | 15 |
Illinois | 13 |
Texas | 12 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards without Reservations | 1 |
Meets WWC Standards with or without Reservations | 1 |
Tabachnick, Joan – International Journal of Behavioral Consultation and Therapy, 2013
In 1995, the American Medical Association declared sexual abuse a "silent, violent epidemic." Since that declaration, there has been a growing acceptance and awareness of the need for a broader public health approach to preventing sexual violence. However, it is only recently that individuals and organizations are beginning to look at…
Descriptors: Prevention, Sexual Abuse, Public Health, Violence
Mueck, Robert P.; Parker, Ashley – Campus Law Enforcement Journal, 2011
Sometimes one never knows what sparks an idea or causes people to come together and take something forward. An example of this is Operation COP at the University of Maryland in College Park. Their version of the "See Something, Say Something" campaign is being touted as a crime prevention program, while it is at the same time an…
Descriptors: Crime Prevention, Terrorism, School Security, Law Enforcement
Miller, Paul – Open Review of Educational Research, 2014
The right of children to be protected from abuse is grounded in international law. Children should be free to enjoy their childhoods and to engage with their physical environment without fear for their safety. In recent years, girls and women in Jamaica have been targeted by men who rape and/or otherwise sexually assault them. This is without…
Descriptors: Children, At Risk Persons, Child Welfare, Child Safety
Curran, F. Chris – Society for Research on Educational Effectiveness, 2014
Students' ability to succeed academically in the school setting depends heavily on factors that students face outside of the school walls. One such contributor is the presence of a safe environment for students to travel to and from school. Unfortunately, for many students in urban and economically depressed environments, the daily commute to and…
Descriptors: Safety, Crime, Violence, Educational Environment
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Yates, Pamela M. – International Journal of Behavioral Consultation and Therapy, 2013
Treatment of sexual offenders has evolved substantially over the years; various theoretical and practice models of treatment been developed, modified, refined, and proposed over time. The predominant current recommended approach, supported by research, adheres to specific principles of effective correctional intervention, follows a…
Descriptors: Best Practices, Intervention, Correctional Rehabilitation, Institutionalized Persons
Pickett, Justin T.; Mears, Daniel P.; Stewart, Eric A.; Gertz, Marc – Crime & Delinquency, 2013
In "The Culture of Control: Crime and Social Order in Contemporary Society," David Garland linked contemporary crime control policies and welfare reforms to a cultural formation that he termed the "crime complex of late modernity." According to Garland, once established, the crime complex exerts a contemporaneous effect on…
Descriptors: Crime, Prediction, Welfare Services, Security (Psychology)
Abu Jbara, Ahmed – ProQuest LLC, 2013
Models, created using different modeling techniques, usually serve different purposes and provide unique insights. While each modeling technique might be capable of answering specific questions, complex problems require multiple models interoperating to complement/supplement each other; we call this Multi-Modeling. To address the syntactic and…
Descriptors: Models, Problem Solving, Research Methodology, Research Problems
Diliberti, Melissa; Jackson, Michael; Kemp, Jana – National Center for Education Statistics, 2017
This report presents findings on crime and violence in U.S. public schools, using data from the 2015-16 School Survey on Crime and Safety (SSOCS:2016). First administered in school year 1999-2000 and repeated in school years 2003-04, 2005-06, 2007-08, 2009-10, and 2015-16, SSOCS provides information on school crime-related topics from the…
Descriptors: Crime, Violence, Discipline, School Safety
Domain, Melinda Willoughby – ProQuest LLC, 2014
This qualitative phenomenological study employed narrative inquiry to describe the decision-making processes that Texas school districts followed in enacting firearms policies that allow school employees to carry concealed weapons on district property. Exploration of the lived experiences of eight Texas superintendents in such schools contributed…
Descriptors: Decision Making, School Districts, Weapons, Gun Control
Schweer, Jen Luettel; Heather, Katie; Kay, Kathryn; Stewart, K. Leigh; Kovach, Laura – NASPA Journal About Women in Higher Education, 2012
R.U. Ready? at Georgetown University is an annual sexual assault awareness event that incorporates peer education and resources with opportunities for students, staff, and faculty to dialogue about providing bystander intervention throughout the campus community. Beyond dialogue, participants learn about student activism and the resources and…
Descriptors: Peer Teaching, College Students, Consciousness Raising, Peer Relationship
Mejia, Pamela; Cheyne, Andrew; Dorfman, Lori – Journal of Child Sexual Abuse, 2012
News media coverage of child sexual abuse can help policymakers and the public understand what must be done to prevent future abuse, but coverage tends to focus on extreme cases. This article presents an analysis of newspaper coverage from 2007 to 2009 to describe how the daily news presents and frames day-to-day stories about child sexual abuse.…
Descriptors: Sexual Abuse, Child Abuse, Prevention, News Reporting
Sellke, Sarah H. – ProQuest LLC, 2010
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
Descriptors: Internet, Computer Security, Crime Prevention, Technical Support
Christensen, M. Candace – NASPA Journal About Women in Higher Education, 2015
This study explores the experiences of male college students who participated in a theatre-based, peer-education, sexual assault prevention presentation. The program was established through the use of Pedagogy of the Oppressed and Theatre of the Oppressed, as well as multicultural feminist theory and approaches. These models emphasize subverting…
Descriptors: Males, College Students, Violence, Prevention
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks