Publication Date
In 2025 | 60 |
Since 2024 | 382 |
Since 2021 (last 5 years) | 1220 |
Since 2016 (last 10 years) | 2677 |
Since 2006 (last 20 years) | 5949 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 513 |
Media Staff | 363 |
Policymakers | 296 |
Administrators | 211 |
Teachers | 166 |
Researchers | 83 |
Parents | 47 |
Students | 37 |
Counselors | 22 |
Community | 14 |
Support Staff | 10 |
More ▼ |
Location
Australia | 348 |
United States | 293 |
Canada | 291 |
United Kingdom | 255 |
California | 194 |
Texas | 142 |
Turkey | 112 |
South Africa | 109 |
New York | 105 |
Ohio | 98 |
Nigeria | 95 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards without Reservations | 3 |
Meets WWC Standards with or without Reservations | 5 |
Does not meet standards | 1 |
Schneider, Sue; Brothers, Allyson – Journal of Extension, 2019
There is a growing imperative to ensure that aging-related resources and information are accessible to older adults and caregivers as the population ages. Extension can play an important role in associated education and outreach. We report on the results of a community assessment conducted in Larimer County, Colorado, that addressed barriers to…
Descriptors: Extension Education, Aging Education, Aging (Individuals), Access to Information
Bradford, Nova J.; DeWitt, James; Decker, Jilyan; Berg, Dianne R.; Spencer, Katherine G.; Ross, Michael W. – Sex Education: Sexuality, Society and Learning, 2019
The sex education made available to transgender youth has rarely been studied empirically. In this study, we sought to explore the sex education experiences of transgender young people and summarise their recommendations for transgender-inclusive curricula. Qualitative data from 14 transgender youth in the upper-Midwest USA were collected by means…
Descriptors: Sex Education, Sexual Identity, Access to Education, Student Attitudes
Takeda, Jenny – Knowledge Quest, 2019
What are ways to draw attention to the need for an annual library budget? How can school library leaders advocate for equitable library budgets across a school district? These are questions the library services team of three district librarians researched before taking the first steps toward making transformational change in the Beaverton School…
Descriptors: School Libraries, Library Materials, Budgets, Advocacy
Adachi, Sachiko; Benjamin, Juli-Anne; Carss, Wendy; Williams, Jennifer – International Literacy Association, 2019
Supportive learning environments are often characterized as safe spaces--and for good reason. When students feel seen, heard, and validated, the classroom becomes a sanctuary, one in which developing learners are more likely to engage and explore. Fostering that kind of positive environment requires educators to invest in a child's physical and…
Descriptors: Literacy Education, Childrens Rights, Student Rights, Classroom Environment
Emrey-Arras, Melissa – US Government Accountability Office, 2019
On average, 205,000 U.S. residents report being victims of hate crimes every year, according to Department of Justice (DOJ) officials. Hate crimes, including those motivated by bias against an actual or perceived religion, can have a broader effect than other kinds of violent crimes because they target both the victim and the group the victim…
Descriptors: Crime, Social Bias, Religion, Incidence
Peltzman, Alissa; Curl, Cory – Council of Chief State School Officers, 2019
State and school report cards provide a powerful avenue for states to reach families and the broader public as essential partners in improving student outcomes. The federal Every Student Succeeds Act (ESSA) and many state legislatures require states to publish an array of education data including measures at the state, district, and school levels.…
Descriptors: Data Use, Educational Improvement, Equal Education, Decision Making
Neuman, Yrsa; Laakso, Mikael – Information Research: An International Electronic Journal, 2017
Introduction: Open access, the notion that research output, such as journal articles, should be freely accessible to readers on the Web, is arguably in the best interest of science. In this article, we (1) describe in-depth how a society-owned philosophy journal, "Nordic Wittgenstein Review," evaluated various publishing models and made…
Descriptors: Case Studies, Periodicals, Philosophy, Access to Information
McCollough, Aaron – portal: Libraries and the Academy, 2017
This article describes an exploratory study examining the common perception among library-based publishers that open access academic publications (especially monographs) are not readily discoverable in library catalogs. Using titles from the Michigan Publishing imprint, digital culture books, the study provides an empirical basis for evaluating…
Descriptors: Catalogs, Information Retrieval, Publications, Access to Information
Brett, Kelsey – Journal of Electronic Resources Librarianship, 2018
After three years of collecting electronic resources of troubleshooting tickets in Springhare's LibAnswers at University of Houston Libraries, the author conducted an analysis of over 300 tickets. The type of problem was identified for each ticket and then categorized into a functional area using an existing categorization schema developed at…
Descriptors: Academic Libraries, Library Services, Electronic Libraries, Troubleshooting
Garza, Lanette – Journal of Electronic Resources Librarianship, 2018
Budget allocation decisions have become far more complex and difficult. One obvious reason is the shift from print to electronic purchases. This along with the lack of increased funding to sustain these collections has created a scenario in which all purchasing decisions need to be made with precise planning. This article examines the fund…
Descriptors: Library Services, Expenditures, Budgeting, Academic Libraries
Rodriguez, Michael; Tonyan, Joel; Wilson, Robert T. – Journal of Electronic Resources Librarianship, 2018
For electronic resources and reference librarians, fielding eresource access problems is often a daily task. A library user clicks on a link to an electronic journal article, book, or primary source and is unable to access the full text. Sometimes this problem occurs due to a lapsed subscription, a broken link, or a proxy configuration error. The…
Descriptors: Troubleshooting, Electronic Libraries, Access to Information, Handheld Devices
Frankosky, Rebecca Megan – ProQuest LLC, 2018
Current search engines and information retrieval systems have made extraordinary progress towards interpreting and answering well-defined, direct questions. However, they are often unsatisfactory for assisting users with less well-defined information needs that often occur within an academic context. Examining students' search goals and search…
Descriptors: Search Strategies, Search Engines, Information Retrieval, Graduate Students
Ross, Jessica M. – ProQuest LLC, 2018
Dissemination of news and information is often challenging in small, rural communities, where sprawling geography and limited resources can limit the effectiveness of communication systems. While traditional media and local organizations attempt to inform the public through newspapers, flyers, radio, social media, and word of mouth, no one means…
Descriptors: Public Libraries, Library Role, Rural Areas, Information Dissemination
Culver, Steven M. – AERA Online Paper Repository, 2018
The present study was designed to examine APLU University websites to see if: (1) information about student learning assessment was easily accessible; and (2) if student learning outcomes were stated, at the institutional level and/or program level, by going to the main institutional page and typing "student learning outcomes" in the…
Descriptors: Outcomes of Education, Web Sites, Access to Information, Information Dissemination
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk