Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Access to Information | 14 |
Computer Networks | 14 |
Ethics | 14 |
Information Networks | 5 |
Data Collection | 4 |
Information Technology | 4 |
Privacy | 4 |
Computer Security | 3 |
Computer Uses in Education | 3 |
Higher Education | 3 |
Internet | 3 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 8 |
Opinion Papers | 6 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Speeches/Meeting Papers | 2 |
Books | 1 |
Information Analyses | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Kracke, Nancy – Journal of School Public Relations, 2009
It is tempting to assume that we know what our parents, our community, and our employees want from our schools. It is comforting to think that we know what they support. It is also dangerous. This article encourages school systems to let go of assumptions and to start asking the important questions that will lead school boards and administrators…
Descriptors: Central Office Administrators, School Districts, Information Sources, Stakeholders
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Bennett, Elisabeth E. – Online Submission, 2007
This paper discusses a qualitative case study that addresses how an intranet can provide opportunities for learning about an organization's culture. Four primary findings are discussed with the study concluding that cultural knowledge is conveyed and renewed through an intranet in a learning process that emphasizes informal learning and…
Descriptors: Informal Education, Organizational Culture, Adult Learning, Case Studies
Johnson, Dell – 1991
Institutions of higher education in the United States are making use of educational communication networks, such as the National Science Foundation's INTERNET system, to enhance research and learning. Such information networks are used to exchange information electronically, and exist not only in the United States, but also in other countries.…
Descriptors: Access to Information, Computer Networks, Electronic Mail, Ethics

Anderson, Byron – Thresholds in Education, 1993
Examines why so many people have trouble understanding and accessing online systems, using the ERIC Silver Platter CD-ROM as an example. All online systems require users to know the proper procedures (protocols) to access information; these differ from product to product and change constantly. Users should know a particular database's scope and…
Descriptors: Access to Information, Computer Networks, Elementary Secondary Education, Ethics

Kulikowski, Juliusz – International Information & Library Review, 1997
Discusses the commonly accepted human right to information, access to information in highly computerized societies, and protection of the interests of users of information. Considers the potential for morally doubtful or illegal activities that is created by easy access to computer networks and information services. Technical,…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Developing Nations
Connolly, Mary V. – 1997
The Internet is a network of networks, sharing the same protocol and linking universities, research communities, businesses, and individuals world wide. In this new global information infrastructure, all citizens need to understand the power and pitfalls of the technology in order to function as responsible members. This paper discusses issues…
Descriptors: Access to Information, Computer Networks, Computer Security, Copyrights
Johnson, Deborah G. – EDUCOM Review, 1994
Discusses computer ethics and the use of computer networks. Topics addressed include computer hackers; software piracy; computer viruses and worms; intentional and unintentional abuse; intellectual property rights versus freedom of thought; the role of information in a democratic society; individual privacy; legislation; social attitudes; and the…
Descriptors: Access to Information, Computer Networks, Democracy, Educational Needs
Denning, Dorothy E., Ed.; Lin, Herbert S., Ed. – 1994
This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services,…
Descriptors: Access to Information, Censorship, Computer Networks, Confidentiality
Mason, Richard O. – EDUCOM Review, 1994
Discusses digital convergence, moral responsibilities, democratic principles, and the need to provide access to basic equipment that can be part of an information network; access to public information, including the ability to receive and transmit information necessary for effective citizen participation; and effective interfacing, i.e.,…
Descriptors: Access to Computers, Access to Information, Citizen Participation, Computer Literacy

Daly, Joanne English – Journal of Educational Technology Systems, 1998
Addresses the following obstacles faced by faculty and students in the use of World Wide Web-based support and instruction: multiple skill levels of students performing Web research; credibility of Web information; reliability of campus computer-network systems; inequality of access to student computing resources; and lack of understanding of…
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Equal Education

Johnson, Doug – Emergency Librarian, 1995
Discusses issues involving physical and intellectual access to the Internet. Topics include skills for effective use; the importance of teachers and librarians ensuring full access for students; and a vision of information access needs in the future. The Mankato Internet Skill Rubrics evaluation checklist is appended. (AEF)
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Ethics