Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Privacy | 46 |
Secondary Education | 19 |
Learning Activities | 13 |
Social Studies | 13 |
Constitutional Law | 10 |
Internet | 9 |
Law Related Education | 9 |
Class Activities | 8 |
Freedom of Speech | 8 |
Civil Liberties | 7 |
Civil Rights | 7 |
More ▼ |
Source
Author
Aldridge, Kathy | 1 |
Asal, Victor | 1 |
Becker, Jonathan D. | 1 |
Beckett, Ernest | 1 |
Binder, Perry | 1 |
Clarke, Phyllis | 1 |
Croddy, Marshall | 1 |
DeLay, Jeanine A. | 1 |
Degelman, Charles | 1 |
Donahue, Simone A. | 1 |
Edwards, Amy N. | 1 |
More ▼ |
Publication Type
Education Level
Elementary Secondary Education | 4 |
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Teachers | 22 |
Practitioners | 19 |
Students | 6 |
Administrators | 1 |
Parents | 1 |
Location
United States | 3 |
Australia | 1 |
Canada | 1 |
China | 1 |
India | 1 |
USSR | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
United States Constitution | 4 |
Fourth Amendment | 2 |
Bill of Rights | 1 |
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
First Amendment | 1 |
Individuals with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Becker, Jonathan D.; Levin, Douglas A. – Journal of Cases in Educational Leadership, 2020
School systems collect and maintain increasingly significant amounts of data and information on students, faculty, and staff and have a duty of care to ensure that sensitive information remains secure. Therefore, sitting and/or aspiring school leaders need to develop at least a basic understanding of data privacy and information security…
Descriptors: Information Security, School Policy, Policy Formation, Privacy
Binder, Perry; Willey, Susan L.; Weston, Harold A. – Journal of Legal Studies Education, 2020
The authors developed a teaching project for students to debate data and workplace privacy dilemmas, formulate plans of action for the use of certain data about workers and job applicants, and apply the law to reach and defend their solutions. The purpose of this versatile exercise is to sensitize both undergraduate and graduate business students…
Descriptors: Privacy, Data Use, Law Related Education, Business Administration Education
Larson, Eric C.; Vieregger, Carl – Journal of Information Systems Education, 2019
This teaching case highlights the complex and unique strategic issues facing social media platform companies, using Facebook as the primary, motivating example. The case centers on the breach of trust that occurred when Cambridge Analytica acquired user data from 87 million Facebook accounts and then attempted to sway the 2016 U.S. Presidential…
Descriptors: Social Media, Strategic Planning, Trust (Psychology), Users (Information)
Office of Educational Technology, US Department of Education, 2023
This guide is designed to provide important resources and recommendations to support teacher implementation of digital learning. Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This guide will…
Descriptors: Teaching Guides, Teaching Methods, Technology Uses in Education, Learning Experience
Wilson, Alan – Online Submission, 2010
The materials include a general discussion of privacy that raises points and questions to engage students in the subject before they complete the hypothetical case study that follows in a three-part, workbook format. (Purpose) The purpose is to engage students in a critical thinking exercise that requires students to analyze a developing situation…
Descriptors: Decision Making, Moral Values, Critical Thinking, Ethics
American Federation of Teachers (NJ), 2010
Modern technology and the Internet have opened the door to a plethora of new opportunities to learn. It is now easier to research, communicate and study, thanks to advances in technology. There are, however, problems and dangers associated with new technology. Teachers need to remain up to date on these advances. The widespread popularity of…
Descriptors: Internet, Educational Technology, Computer Uses in Education, Teaching Methods
de Abreu, Belinha S. – Peter Lang New York, 2011
This book, a resource for educators, uses the theme of media literacy as a lens through which to view and discuss social networking and Web 2.0 environments. There is ongoing and positive research on the participatory culture created by youth who are heavily involved in the new digital technologies, yet schools tend to avoid these mediums for fear…
Descriptors: Media Literacy, Internet, Social Networks, Electronic Publishing

Extejt, Marian M. – Business Communication Quarterly, 1998
Discusses current standards for formatting and etiquette of electronic mail in the business setting. Discusses privacy and appropriate content. Notes that class assignments involving electronic mail provide practical opportunities to develop ease with this form. (SR)
Descriptors: Business Communication, Electronic Mail, Higher Education, Privacy

Letwin, Alita Z. – Update on Law-Related Education, 1982
Describes six activities from Law in a Free Society (LFS) materials designed to help elementary and secondary students examine a variety of privacy issues. Students read literature, a news release, or another type of written material and answer questions. A list of enrichment activities is also included. (AM)
Descriptors: Class Activities, Elementary Secondary Education, Legal Education, Privacy

Petras, Richard T. – Mathematics Teacher, 2001
Introduces RSA, one of the most popular public-key cryptosystems that is used to protect the privacy of computer users. Describes the mathematical foundation of public key cryptography. (KHR)
Descriptors: Cryptography, Curriculum Development, Internet, Mathematical Applications
Harwood, Paul G.; Asal, Victor – Praeger, 2007
Asal and Harwood explore how today's information technology is changing how teachers educate and are educated. Focusing on the United States, with useful insights from the classroom digital revolution in a few other places (the United Kingdom, Australia, and India), the authors investigate the impact of today's technologies on education--how they…
Descriptors: Foreign Countries, Profiles, Internet, Educational Technology

Fisher, Margaret – Update on Law-Related Education, 1988
Uses a discussion of the U.S. Constitution's Fourth Amendment and a case study entitled "Search and Seizure at a Rock Concert" to teach secondary students about privacy, property, and justice. Examines exceptions to the Fourth Amendment and describes "probable cause" as it relates to searches. (GEA)
Descriptors: Case Studies, Law Related Education, Lesson Plans, Privacy
Payton, Tammy – Library Talk, 1999
Suggests classroom pen pals as a good Internet activity for elementary school students. Highlights include Web sites that host pen-pal information; visiting schools; Web sites; educational listservs; safety tips to discuss before sending e-mail; and suggested topics and activities. (LRW)
Descriptors: Class Activities, Computer Uses in Education, Electronic Mail, Elementary Education

Rymer, Jone – Business Communication Quarterly, 1998
Presents a case study for use in business communication classes to help students understand and learn both the context and the strategies for the communication with business management. Deals with a business problem revolving around issues of appropriate e-mail use and privacy. Includes five assignments. (SR)
Descriptors: Business Communication, Case Method (Teaching Technique), Class Activities, Electronic Mail

Donahue, Simone A. – Update on Law-Related Education, 1991
Presents a lesson plan for teaching about gangs and the Fourth Amendment of the U.S. Constitution. Includes a handout and discussion questions and identifies sources for further reading. (SG)
Descriptors: Civil Liberties, Constitutional Law, Court Litigation, Juvenile Gangs