NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 16 to 30 of 82 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Barton, Sarah; Hatcher, Richard – FORUM: for promoting 3-19 comprehensive education, 2014
The UK government seized the opportunity of the Trojan Horse affair to launch a damaging Islamophobic attack, eagerly relayed by a racist press, on the Muslim community in Birmingham and beyond, abusing Ofsted and the Prevent strategy as blatant instruments of ideologically-driven policy. The various reports found no evidence of radicalisation or…
Descriptors: Islamic Culture, Islam, Muslims, Evidence
Peer reviewed Peer reviewed
Direct linkDirect link
Miah, Shamim – International Studies in Sociology of Education, 2016
Muslims are folk-devils that mark the ubiquitous moral panic. For some, the idea of the "Muslim problematic" signifies a long and worrying trend of creeping "Islamification" of state schools. For others, the discourse of the "Muslim problematic" reflects the ongoing racial patholigisation of Britain's minoritised…
Descriptors: Muslims, Urban Schools, Racial Relations, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Volbrecht, Terry – Studies in Continuing Education, 2009
This article reflects on some of the findings of a research project which investigated the practice of Recognition of Prior Learning (RPL) within a major national teacher upgrading project in South Africa--the National Professional Diploma in Education (NPDE). The article analyses the ways in which a range of contextual factors have positioned RPL…
Descriptors: Foreign Countries, Recognition (Achievement), Prior Learning, Performance Based Assessment
Peer reviewed Peer reviewed
Direct linkDirect link
Chrysochou, Polina-Theopoula – Journal for Critical Education Policy Studies, 2018
This article, placed in the general framework of a global attempt to reform education by making it comply with neoconservative and neoliberal directions, discusses the particular case of Greece, and investigates the possibility of an international educational paradigm-seeking to impose a market reasoning on school culture and create a disciplined…
Descriptors: Foreign Countries, Educational Change, Teacher Role, Economic Climate
Peer reviewed Peer reviewed
Direct linkDirect link
Gould, Elizabeth – Educational Philosophy and Theory, 2011
North American music education is a commodity sold to pre-service and in-service music teachers. Like all mass-produced consumables, it is valuable to the extent that it is not creative, that is, to the extent that it is reproducible. This is demonstrated in curricular materials, notably general music series textbook and music scores available…
Descriptors: Creativity, Music Education, Music, Creative Writing
Peer reviewed Peer reviewed
Direct linkDirect link
Scully-Russ, Ellen – Journal of Research and Practice for Adult Literacy, Secondary, and Basic Education, 2015
In this article, Ellen Scully-Russ responds to St. Clair's analysis (EJ1072357) of the recent policy report from the Office of Career, Technical and Adult Education, "Making Skills Everyone's Business: A Call to Transform Adult Learning in the United States" (MSEB) (United States Department of Education [USDoE], 2015). While Scully-Russ…
Descriptors: Reader Response, Adult Education, Adult Learning, Educational Change
Peer reviewed Peer reviewed
Direct linkDirect link
Everington, Judith – Journal of Beliefs & Values, 2015
This article takes as its starting point concerns about community separation that arose in 2001, following outbreaks of violence in English urban centres, and again in 2014, following the so-called "Trojan Horse" case. Despite a series of reports which have highlighted the need to address "separation", promote "meaningful…
Descriptors: Religious Education, Qualitative Research, Ethnicity, World Views
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Richardson, Robin – London Review of Education, 2015
In the final eleven months of its five-year term, the Coalition Government placed much emphasis in the education system on what it called fundamental British values (FBV). The phrase had its origins in counter-terrorism strategies that were of dubious validity both conceptually and operationally, and the trigger for its introduction into the…
Descriptors: Foreign Countries, Values, Educational Policy, Politics of Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chiang, Li-chuan – Higher Education Policy, 2012
Responding to the impacts of globalization and the knowledge economy, the increasing demand for higher education in East Asia is not only met by domestic higher education, but also by importing transnational higher education (TNHE). Importing TNHE becomes an export strategy to attract international students to contribute to capacity building for…
Descriptors: Foreign Countries, International Education, Higher Education, Problems
Peer reviewed Peer reviewed
Direct linkDirect link
Tolosa-Kline, Ayla; Yom-Tov, Elad; Hoffman, Caitlin; Walker-Baban, Cherie; Lewis, Felicia M. T. – Health Education & Behavior, 2021
Background: Men who have sex with men (MSM) increasingly use internet-based websites and geospatial apps to seek sex. Though these platforms may be useful for public health intervention, evaluations of such interventions are rare. We sought to evaluate the online behavior of young MSM of color in Philadelphia and the effectiveness of using ads to…
Descriptors: Advertising, Prevention, Sexually Transmitted Diseases, LGBTQ People
Peer reviewed Peer reviewed
Direct linkDirect link
Štech, Stanislav – Journal of Pedagogy, 2011
This essentially polemical article questions whether the Bologna Process (BP) is necessary (and desirable) in the adaptation of universities to the new social conditions or whether it is a Trojan horse sent out to introduce neo-liberal changes in the field of higher education. First, it addresses the circumstances surrounding the origins of the…
Descriptors: Higher Education, International Cooperation, Educational Cooperation, Student Mobility
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Christensen, Steen Hyldgaard; Erno-Kjolhede, Erik – European Journal of Engineering Education, 2008
Philosophy of technology/philosophy of science has recently become part of the curriculum of engineering degree programmes in Denmark. However, to what extent do teachers of engineering see it as meaningful for students to work with relatively abstract philosophical concepts such as epistemology, ontology and ethics as part of engineering degree…
Descriptors: Engineering Education, Engineering, Foreign Countries, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Templer, Bill – Journal for Critical Education Policy Studies, 2009
This paper argues for new departures in English as an International Language (EIL) pedagogy for the social majorities "in their own interest," not that of the privileged stratum of metropolitan elites. It is incontestable that the unstoppable spread of global English is a product of cultural, socioeconomic and political hegemony that is ultimately…
Descriptors: Mass Instruction, English (Second Language), Second Language Learning, Language Role
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Pages: 1  |  2  |  3  |  4  |  5  |  6