NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)2
Laws, Policies, & Programs
First Amendment2
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 26 results Save | Export
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Peer reviewed Peer reviewed
Jones, Robert Alun – Internet Research, 1994
Notes that research on the use of networked information resources, like any kind of social science involving the study of human subjects, raises ethical questions. The tension between traditional research guidelines and new technologies is discussed; public/private distinctions and informed consent are addressed; and possible solutions are…
Descriptors: Computer Networks, Definitions, Ethics, Guidelines
Smoot, Oliver – EDUCOM Review, 1994
Examines the relationship between the National Information Infrastructure (NII) and the new General Agreement on Tariffs and Trade. Topics discussed include the reduction or elimination of tariffs on NII products; protection of copyrighted works; unresolved trade issues, including the European telecommunications market; standards; and privacy and…
Descriptors: Computer Networks, Copyrights, Foreign Countries, Information Networks
Shea, Virginia – EDUCOM Review, 1994
Discusses rules of etiquette for communicating via computer networks, including conversing as politely as you would face-to-face; ethical behavior; becoming familiar with the domain that you are in; rules for discussion groups; quality of writing; sharing appropriate knowledge; and respecting individuals' privacy. (LRW)
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Electronic Mail
Peer reviewed Peer reviewed
Smith, Stephen A. – Communication Education, 1994
Examines First Amendment, privacy, and intellectual property issues of communication on the Internet. Discusses developments in communications policy related to the proposed communication superhighway. Suggests ways in which communication scholars can secure fundamental legal protections necessary for full, free, and effective communication in the…
Descriptors: Computer Networks, Freedom of Speech, Higher Education, Information Networks
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Rotenberg, Marc – EDUCOM Review, 1994
Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)
Descriptors: Computer Networks, Confidential Records, Educational Needs, Federal Legislation
Hill, Julia M. – Electronic Networking: Research, Applications and Policy, 1992
The X.500 Directory Service provides a mechanism for finding information about people, organizations, services, network hardware, and more in the global network environment. Issues involved in X.500 participation by an organization include management support, data gathering, rights and concerns of individuals, access control, privacy, accuracy,…
Descriptors: Access to Information, Computer Networks, Directories, Electronic Mail
General Accounting Office, Washington, DC. – 1995
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Descriptors: Communications, Computer Networks, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks
Johnson, Deborah G. – EDUCOM Review, 1994
Discusses computer ethics and the use of computer networks. Topics addressed include computer hackers; software piracy; computer viruses and worms; intentional and unintentional abuse; intellectual property rights versus freedom of thought; the role of information in a democratic society; individual privacy; legislation; social attitudes; and the…
Descriptors: Access to Information, Computer Networks, Democracy, Educational Needs
Gordon, Mark L.; McKenzie, Diana J. P. – Illinois Libraries, 1994
Discusses the development of a national information superhighway. Highlights include the National Information Infrastructure; NREN (National Research and Education Network); private networks, including Prodigy; repositioning in the telecommunications industry, including telephone, cable, and entertainment companies; government regulations;…
Descriptors: Cable Television, Computer Networks, Copyrights, Economic Factors
Peer reviewed Peer reviewed
Wiggins, Rich – Public-Access Computer Systems Review, 1993
Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…
Descriptors: Access to Information, Computer Networks, Computer Software, Electronic Publishing
Peer reviewed Peer reviewed
Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks
Previous Page | Next Page ยป
Pages: 1  |  2