NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,201 to 1,215 of 1,682 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Anwar, Muhammad Nadeem; Sarwar, Muhammad; Awan, Riffat-un-Nisa; Arif, Muhammad Irfan – International Education Studies, 2011
Any behavior that does not conform to social organizational norms is deviance. This study was conducted to test whether there is any difference in organizational deviance and interpersonal deviance behavior, deviance behavior of male-female university teachers. All teaching staff of the University of Sargodha was target population and for…
Descriptors: Gender Differences, College Faculty, Teacher Behavior, Interpersonal Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Koyama, Jill P. – Journal of Education Policy, 2011
This article ethnographically examines the ways in which No Child Left Behind (NCLB) links local practices to the centralized processing of data through its narrowing of procedures and measurements aimed at accountability. Framed by actor-network theory, it draws upon data consistently collected between June 2005 and October 2008, and then…
Descriptors: Federal Legislation, Ethnography, Accountability, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Ma, Fengling; Xu, Fen; Heyman, Gail D.; Lee, Kang – Journal of Experimental Child Psychology, 2011
This research examined how Chinese children make moral judgments about lie telling and truth telling when facing a "white lie" or "politeness" dilemma in which telling a blunt truth is likely to hurt the feelings of another. We examined the possibility that the judgments of participants (7-11 years of age, N=240) would differ…
Descriptors: Value Judgment, Social Environment, Foreign Countries, Moral Values
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ruth, Alison – Australian Journal of Teacher Education, 2009
In this paper I argue that the kinds of literacy needed for making sense of information on websites is more nuanced and embedded in our everyday context that we are currently providing for learners. The kinds of analysis of websites which allow the processing of information in context are presented. This is demonstrated by an analysis of a scam…
Descriptors: Web Sites, Information Literacy, Reading Skills, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Ren, Kai – Higher Education Policy, 2012
Academic corruption in China's higher education institutions has become a serious issue in the last decade. This paper provides a critical discussion of the Chinese Ministry of Education's policy developments aimed to strengthen academic ethics and control academic corruption. It suggests that while the reactions of policy-makers to the apparent…
Descriptors: Higher Education, Foreign Countries, Ethics, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Carrion, Ricardo E.; Keenan, Julian P.; Sebanz, Natalie – Cognition, 2010
Human social cognition critically relies on the ability to deceive others. However, the cognitive and neural underpinnings of deception are still poorly understood. Why does lying place increased demands on cognitive control? The present study investigated whether cognitive control processes during deception are recruited due to the need to…
Descriptors: Social Cognition, Deception, Diagnostic Tests, Cognitive Ability
Peer reviewed Peer reviewed
Direct linkDirect link
Laird, Robert D.; Marrero, Matthew D. – Journal of Adolescence, 2010
This study sought to determine whether adolescents' strategic management of information about their misbehavior was associated with behavior problems and whether the associations were moderated by parental trust or adolescent authority beliefs. Data were provided by 218 mother-adolescent dyads. Adolescents (49% female; M age = 12 years) reported…
Descriptors: Behavior Problems, Trust (Psychology), Adolescents, Parent Child Relationship
Okrzesik, Daryl J.; Nuehring, Bert G. – School Business Affairs, 2011
Internal accounts offer schools a faster, more convenient way to handle the income and expenses that result from student fees, school clubs and organizations, field trips, fund-raising, and similar activities. But this convenience also incurs the added risk of fraud. Fortunately, there are proven ways to strengthen internal controls and reduce…
Descriptors: Accounting, School Accounting, Financial Audits, Finance Reform
Peer reviewed Peer reviewed
Direct linkDirect link
Horan, Sean M.; Booth-Butterfield, Melanie – Human Communication Research, 2011
This investigation explored the risks of affectionate expressions in romantic relationships by examining the physiological and emotional implications of recalled expressed deceptive affectionate messages to romantic partners. Ninety-nine participants were assigned to one of three conditions: deceptive affection, honest affection, or plans with a…
Descriptors: Dating (Social), Interpersonal Relationship, Intimacy, Risk
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Farisi, Mohammad Imam – Turkish Online Journal of Distance Education, 2013
Today, in the era of open access to digital-based information and communication, one of the biggest challenges in higher education to realize moral education and to build academic culture and integrity is the emergence of academic dishonesty behaviors among academic members. The paper describes academic dishonesty behaviors in Distance Higher…
Descriptors: Ethics, Distance Education, Higher Education, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Chitty, Clyde – FORUM: for promoting 3-19 comprehensive education, 2009
This article examines the findings of the recent London School of Economics RISE Report looking at policies relating to secondary school admissions in England.
Descriptors: Foreign Countries, Admission (School), Economics, Secondary Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Thomas, Michael L.; Lanyon, Richard I.; Millsap, Roger E. – Psychological Assessment, 2009
The use of criterion group validation is hindered by the difficulty of classifying individuals on latent constructs. Latent class analysis (LCA) is a method that can be used for determining the validity of scales meant to assess latent constructs without such a priori classifications. The authors used this method to examine the ability of the L…
Descriptors: Validity, Measures (Individuals), Statistical Analysis, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Greve, Kevin W.; Curtis, Kelly L.; Bianchini, Kevin J.; Ord, Jonathan S. – Assessment, 2009
This two-part study sought to determine the equivalence of the California Verbal Learning Tests (CVLT-1 and CVLT-2) in the detection of malingering in traumatic brain injury (TBI) and chronic pain. Part 1 compared a variety of scores from the two versions in carefully matched patient groups. Part 2 used criterion groups (known-groups) methodology…
Descriptors: Patients, Verbal Learning, Verbal Tests, Pain
Peer reviewed Peer reviewed
Direct linkDirect link
Amare, Nicole; Manning, Alan – Business Communication Quarterly, 2009
To date, business communication scholars and textbook writers have encouraged resume rhetoric that accommodates technology, for example, recommending keyword-enhancing techniques to attract the attention of searchbots: customized search engines that allow companies to automatically scan resumes for relevant keywords. However, few scholars have…
Descriptors: Business Communication, Rhetoric, Search Engines, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Duran, Nicholas D.; Hall, Charles; McCarthy, Philip M.; McNamara, Danielle S. – Applied Psycholinguistics, 2010
The words people use and the way they use them can reveal a great deal about their mental states when they attempt to deceive. The challenge for researchers is how to reliably distinguish the linguistic features that characterize these hidden states. In this study, we use a natural language processing tool called Coh-Metrix to evaluate deceptive…
Descriptors: Computer Mediated Communication, Linguistics, Information Technology, Deception
Pages: 1  |  ...  |  77  |  78  |  79  |  80  |  81  |  82  |  83  |  84  |  85  |  ...  |  113