Descriptor
Computer Networks | 5 |
Privacy | 5 |
Higher Education | 3 |
Information Networks | 3 |
Legal Responsibility | 3 |
Computer Mediated… | 2 |
Copyrights | 2 |
Data Collection | 2 |
Information Technology | 2 |
Internet | 2 |
Policy Formation | 2 |
More ▼ |
Source
CAUSE/EFFECT | 2 |
Library Hi Tech | 2 |
Author
Hawke, Constance S. | 1 |
Hodges, Marjorie W. | 1 |
Lynch, Clifford | 1 |
Lynch, Clifford A. | 1 |
Rubin, Michael Rogers | 1 |
Worona, Steven L. | 1 |
Publication Type
Journal Articles | 4 |
Guides - Non-Classroom | 3 |
Reports - Descriptive | 3 |
Books | 1 |
Opinion Papers | 1 |
Education Level
Audience
Practitioners | 5 |
Administrators | 2 |
Media Staff | 2 |
Students | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks
Hodges, Marjorie W.; Worona, Steven L. – CAUSE/EFFECT, 1996
Provides guidelines for the development of campus computer policies, focusing on legal issues related to adult material, harassment, privacy, commerce, and copyright. Notes that computer use policies and practices need to evolve in concert with the changing computer culture. (MDM)
Descriptors: Business, College Role, Computer Networks, Computers
Hawke, Constance S. – 2001
The purpose of this book is threefold: (1) to inform Internet users of the legal ramifications of their on-line activities; (2) to help administrators handle specific situations or complaints regarding Internet activity; and (3) to provide guidance for the formulation of acceptable computer use policies on campuses. The chapters are: chapter 1,…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Copyrights
Lynch, Clifford – CAUSE/EFFECT, 1998
Describes access management problems associated with networked information systems and the two major architectural approaches used to address them, including discussion of related policy issues such as privacy, accountability, and collection of management data. Focus is on the concerns of colleges and universities and on developing practical…
Descriptors: Access to Information, Accountability, Administrative Policy, College Administration

Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)