NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 361 to 375 of 1,325 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
O'Brien, Sandra Pavelka – Prevention Researcher, 2007
A modern-day movement is transforming the way that communities and justice systems think about and respond to crime and wrongful occurrences. This response implements a holistic continuum of services, providing for prevention, intervention, diversion, commitment, probation, reentry, and aftercare. This approach--known as restorative justice--seeks…
Descriptors: Equal Protection, Justice, Crime Prevention, Criminal Law
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Borja, Rhea R. – Education Week, 2006
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
Descriptors: Computer Security, Computer Networks, Students, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…
Descriptors: Computers, Computer Security, Crime Prevention, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Pattavina, April; Byrne, James M.; Garcia, Luis – Crime & Delinquency, 2006
In the following study, the authors examine factors that explain citizen participation in crime prevention activities in Boston. Using survey data from a random sample, census data, and official crime and arrest data, the authors identified a wide range of individual- and community-based indicators that could potentially explain citizen…
Descriptors: Neighborhoods, Crime, Crime Prevention, Social Control
New Jersey Department of Education, 2013
The Commissioner's annual report provides the Governor and Legislature with information reported by school districts concerning incidents of serious student misconduct grouped into the following five major reporting categories: violence; vandalism; harassment, intimidation and bullying (HIB); weapons; and substance abuse. An analysis of trends…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Conde, Carlos D. – Education Digest: Essential Readings Condensed for Quick Review, 2007
Illegal migrants are a nonentity in the United States, and, to a certain extent, many prefer it that way. They exist in society's netherworld, living under their own code of survival by whatever means they can, since the alternatives are less inviting. Mostly, they struggle. People take advantage of them at every opportunity because they are…
Descriptors: Migrants, Slavery, Labor Force, Undocumented Immigrants
Frandsen, Scott – ProQuest LLC, 2010
In an effort to safeguard the learning environment, school administrators generally rely on district or local school guidelines and professional judgment. With new technology, the proliferation of drug use, and increased school violence, schools have become a complex environment to manage for both system and local leadership. Administrators are…
Descriptors: Violence, Elementary Secondary Education, School Law, Drug Use
Bowles, Jonathan; Colton, Tara; Fischer, David Jason; Giles, David; O'Grady, Jim – Center for an Urban Future, 2009
The inauguration of a new president is a typically a time of great hope, and this year is certainly no exception. But the advent of the Obama administration offers residents of New York and other city-dwellers special grounds for optimism: that the period of years, if not decades, when the federal government all but turned its back on the needs of…
Descriptors: Urban Areas, Federal Government, Presidents, Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dinkes, Rachel; Kemp, Jana; Baum, Katrina – National Center for Education Statistics, 2009
"Indicators of School Crime and Safety: 2008" provides the most recent national indicators on school crime and safety. The information presented in this report is intended to serve as a reference for policymakers and practitioners so that they can develop effective programs and policies aimed at violence and school crime prevention. The…
Descriptors: Crime, School Safety, Violence, Crime Prevention
Willard, Nancy – District Administration, 2008
Two Oregon students create a racist profile on a social networking site, with cartoons about lynching and racist language. Other students link to the profile and post ugly, racist comments. Teachers report that many of the school's minority students are frightened. In another instance, several high school students create a "We Hate…
Descriptors: Internet, Minority Groups, Social Networks, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Gooden, John S.; Harrington, Sonja Y.; Findlay, Hyacinth E.; King, Gwendolyn V. – Journal of School Choice, 2008
The purpose of this qualitative study was to examine nine states' policy responses to the Unsafe School Choice Option between 2002 and 2007. These states had 199 schools designated as "persistently dangerous schools" since 2002. Unsafe School Choice Option is one of the school choice options of the No Child Left Behind law that required…
Descriptors: Federal Legislation, School Choice, Policy Analysis, School Safety
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lekes, Natasha – New Directions for Youth Development, 2007
This article describes the Leave Out Violence (LOVE) program, which was founded in 1993 by Twinkle Rudberg many years after her husband's murder by a fourteen-year-old mugger in downtown Montreal. Realizing that the young person responsible for taking her husband's life was also a victim of violence, Rudberg was inspired to create a violence…
Descriptors: Violence, Crime Prevention, Social Action, Leadership Training
Wren, Andrew; Spicer, Brad – American School & University, 2007
The use of surveillance cameras in schools is not new, but just about everything involved with the technology and the way it is used is new. Surveillance equipment once was a precautionary system, relegated to the corner, where it gathered dust until an incident took place, then administrators would painstakingly roll out the video to investigate…
Descriptors: Video Equipment, Photography, School Security, Crime Prevention
Pages: 1  |  ...  |  21  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  ...  |  89