NotesFAQContact Us
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 31 to 45 of 55 results Save | Export
Mekdeci, Kelly Broyles – ProQuest LLC, 2011
United States schools and American Overseas (A/OS) schools depend upon educational technology (ET) to support business operations and student learning experiences. Schools rely upon administrative software, on-line course modules, information databases, digital communications systems, and many other ET processes. However, ET's fragility compared…
Descriptors: Foreign Countries, Educational Technology, Computer Uses in Education, Institutional Mission
Peer reviewed Peer reviewed
Direct linkDirect link
McLendon, Michael K.; Hearn, James C. – Teachers College Record, 2010
Background/Context: Every state in the nation has legal requirements, state "sunshine laws," to ensure accountability and fairness in institutions receiving state funds and operating under state authority. These laws have come to significantly influence the ways in which the business of higher education is conducted. Purpose/Objective/Research…
Descriptors: State Legislation, Access to Information, Information Policy, Higher Education
Peer reviewed Peer reviewed
Lepkowski, Wil – Chemical and Engineering News, 1978
Leaders in American business list the major nonmilitary threats to national security. In addition, the relationship of national security and the innovation process is analyzed. (CP)
Descriptors: Business, Development, Government Role, Industry
Fischer, Karin – Chronicle of Higher Education, 2008
Three reports on last April's shootings left Virginia Tech under a mountain of recommendations--roughly 400 in all. So far the university has dealt with some of the most significant ones. Virginia Tech established an emergency-notification system, created a team to assess at-risk students and employees, and hired additional police officers and…
Descriptors: School Safety, Violence, School Security, Crisis Management
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Lunday, Elizabeth – APPA: Association of Higher Education Facilities Officers (NJ1), 2010
The APPA (Association of Higher Education Facilities Officers) Thought Leaders Series turned five years old this year--a significant event in a momentous time for higher education. Participants in the 2010 symposium looked back at both the achievements and the missteps of higher education over the last half-decade, a period that posed many…
Descriptors: Conferences (Gatherings), Strategic Planning, Higher Education, Safety
Gabbard, David A., Ed.; Ross, E. Wayne, Ed. – Teachers College Press, 2008
This highly acclaimed volume in the "Defending Public Schools" series is now available in paperback from Teachers College Press. It is a practical, necessary addition to the work of administrators, teachers, policymakers, and parents as they negotiate the difficult path of how to best teach and educate today's children and youth. This…
Descriptors: Urban Schools, Public Schools, Privatization, Federal Legislation
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Hunter, Richard C.; Mazingo, Terri H. – School Business Affairs, 2003
Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…
Descriptors: Costs, Elementary Secondary Education, School Safety, School Security
Trump, Kenneth S. – School Business Affairs, 1999
The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…
Descriptors: Aggression, Costs, Crisis Management, Elementary Secondary Education
Parfitt, Rick – Campus Law Enforcement Journal, 2012
Campus policing is a geographically focused police practice and the epitome of community oriented policing. Campus law enforcement agencies deal not only with a racially, ethnically, and culturally diverse population, they also deal with populations that change dramatically every year. While some campuses are enclaves unto themselves, many are…
Descriptors: Law Enforcement, Police, State Colleges, School Security
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Haynes, Richard A.; Henderson, Catherine L. – 2001
This self-help guide explores the many factors involved in implementing an effective program of protection for schools. It provides direction and answers to the many questions posed by crime and violence in schools by translating certain principles of security into applications for the campus setting. The guide explains the various protection…
Descriptors: Behavior Problems, Crime Prevention, Crisis Management, Discipline
Peer reviewed Peer reviewed
Direct linkDirect link
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it…
Descriptors: School Nurses, Confidentiality, Risk, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hurlbert, Claude; Mason, Anestine Hector – Composition Forum, 2006
In her groundbreaking book, "The Violence of Literacy", the relevance of which has not diminished in the twelve years since its publication, J. Elspeth Stuckey argues that despite the best intentions of teachers, literacy is largely a tool of oppression rather than liberation. Learning to write, Stuckey argues, does too little to…
Descriptors: Literacy, Violence, International Organizations, Literacy Education
Pages: 1  |  2  |  3  |  4