NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brenner, Philip S. – Field Methods, 2019
In today's survey climate, many individuals doubt the legitimacy of survey invitations. Phishing, an Internet-based fraud that tricks users into disclosing private information, has the potential to further erode the perceived legitimacy of e-mailed survey invitations and harm cooperation. However, no study has tested the effect of phishing on…
Descriptors: Response Rates (Questionnaires), Experiments, Credibility, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shudong; Heffernan, Neil – British Journal of Educational Technology, 2010
Pedagogical theories and the applications of information technology for language learning have been widely researched in various dimensions. However, ethical issues, such as online privacy and security, and learners' personal data disclosure, are not receiving enough research attention. The perceptions and attitudes from those who participate in…
Descriptors: Information Technology, Educational Technology, Ethics, Second Language Learning
PDF pending restoration PDF pending restoration
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1986
This report considers the privacy issues raised by the growth of the new technology being applied to the personal information collected, maintained, and disseminated by the Federal Government. Four major areas are addressed: (1) technological developments relevant to government record systems; (2) current and prospective Federal agency use of…
Descriptors: Computer Oriented Programs, Disclosure, Federal Government, Government Role
Ware, Willis H. – 1985
As the issue of information privacy increases in complexity in terms of the number of organizations involved, the intricacy of the information flows, and the difficulty of conceiving appropriate legal safeguards, it is not certain that the practices and laws that have been developed for current privacy protection can work for new situations.…
Descriptors: Access to Information, Communication (Thought Transfer), Confidential Records, Confidentiality
Peer reviewed Peer reviewed
Petersen, Rodney J.; Hodges, Marjorie W. – New Directions for Student Services, 1997
Summarizes legal issues that pertain to the uses of information technology on campuses. Highlights privacy, freedom of expression, and intellectual property rights. Argues that understanding these legal and ethical issues is necessary in developing an appropriate campus policy. Provides guidance for developing a campus technology policy. (RJM)
Descriptors: Civil Liberties, Computer Uses in Education, Disclosure, Ethics
Trubow, George – 1989
In this policy briefing, the technological developments of recent years are linked to the erosion of individuals' informational privacy under the press of bureaucratic efficiency and the ever-growing needs of executive agencies for more information. It is noted that privacy protection within federal agencies may entail costs, and therefore, may be…
Descriptors: Access to Information, Agency Role, Disclosure, Foreign Countries
Peer reviewed Peer reviewed
Kirby, Michael D. – Government Information Quarterly, 1986
Examines developments in information technology that might endanger individual privacy and legislative responses to these threats by the English-speaking democracies, i.e., Australia, Canada, New Zealand, the United Kingdom, and the United States. Guidelines for the responsible use of information technologies are proposed. (CLB)
Descriptors: Access to Information, Civil Liberties, Democracy, Developed Nations
Seaman, Scott – 1994
Issues concerning the confidentiality of library-patron records in the age of electronics are explored. Confidentiality of patron records is a relatively new concept for libraries and was first introduced in the 1938 Code of Ethics of the American Library Association (ALA). Librarians have worked on a state-by-state basis to protect library…
Descriptors: Codes of Ethics, Confidential Records, Confidentiality, Data