Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Networks | 7 |
Federal Legislation | 7 |
Privacy | 7 |
Information Networks | 3 |
Legal Problems | 3 |
Access to Information | 2 |
Copyrights | 2 |
Educational Needs | 2 |
Government Role | 2 |
Policy Formation | 2 |
Cable Television | 1 |
More ▼ |
Source
EDUCOM Review | 2 |
Annual Review of Information… | 1 |
Chronicle of Higher Education | 1 |
Illinois Libraries | 1 |
Online | 1 |
State Education Standard | 1 |
Author
Goode, Joanne | 1 |
Gordon, Mark L. | 1 |
Hernon, Peter | 1 |
Johnson, Deborah G. | 1 |
Johnson, Maggie | 1 |
McClure, Charles R. | 1 |
McKenzie, Diana J. P. | 1 |
Reg Leichty | 1 |
Rotenberg, Marc | 1 |
Wilson, David L. | 1 |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 6 |
Opinion Papers | 5 |
Information Analyses | 2 |
Guides - General | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Evaluative | 1 |
Education Level
Elementary Secondary Education | 1 |
Audience
Location
United States | 1 |
Laws, Policies, & Programs
First Amendment | 1 |
Freedom of Information Act | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Goode, Joanne; Johnson, Maggie – Online, 1991
Presents a summary of guidelines for the use of electronic mail (e-mail) and examines legal issues and existing law governing electronic communication. The Electronic Communications Privacy Act of 1986 is discussed, lawsuits involving e-mail are described, and the future of e-mail privacy is considered. (11 references) (LRW)
Descriptors: Computer Networks, Court Litigation, Electronic Mail, Federal Legislation
Rotenberg, Marc – EDUCOM Review, 1994
Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)
Descriptors: Computer Networks, Confidential Records, Educational Needs, Federal Legislation
Wilson, David L. – Chronicle of Higher Education, 1993
Campus computing officials are working to improve security against computer hackers because of concerns about privacy, accidental or intentional damage to systems, and impediments to legitimate system users. Increasingly, public law enforcement authorities are called in but do not always take the problem seriously. (MSE)
Descriptors: Cheating, Computer Networks, Crime, Federal Legislation
Johnson, Deborah G. – EDUCOM Review, 1994
Discusses computer ethics and the use of computer networks. Topics addressed include computer hackers; software piracy; computer viruses and worms; intentional and unintentional abuse; intellectual property rights versus freedom of thought; the role of information in a democratic society; individual privacy; legislation; social attitudes; and the…
Descriptors: Access to Information, Computer Networks, Democracy, Educational Needs
Gordon, Mark L.; McKenzie, Diana J. P. – Illinois Libraries, 1994
Discusses the development of a national information superhighway. Highlights include the National Information Infrastructure; NREN (National Research and Education Network); private networks, including Prodigy; repositioning in the telecommunications industry, including telephone, cable, and entertainment companies; government regulations;…
Descriptors: Cable Television, Computer Networks, Copyrights, Economic Factors

Hernon, Peter; McClure, Charles R. – Annual Review of Information Science and Technology (ARIST), 1993
Provides an overview of U.S. federal information policy and its treatment of electronic information resources. Highlights include government publications; electronic government information; main providers of government information, including the Government Printing Office; the Freedom of Information Act; public access and use; information…
Descriptors: Access to Information, Computer Networks, Copyrights, Databases