Descriptor
Computer Security | 10 |
Privacy | 10 |
World Wide Web | 10 |
Internet | 4 |
Access to Information | 3 |
Electronic Mail | 3 |
Foreign Countries | 3 |
Higher Education | 3 |
Information Sources | 3 |
Computer Uses in Education | 2 |
Federal Regulation | 2 |
More ▼ |
Source
Australian Universities'… | 1 |
Electronic Library | 1 |
Journal of Academic… | 1 |
Reference Librarian | 1 |
School Libraries in Canada | 1 |
Author
Publication Type
Reports - Descriptive | 6 |
Journal Articles | 5 |
Guides - Non-Classroom | 2 |
Collected Works - Proceedings | 1 |
Non-Print Media | 1 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Administrators | 2 |
Practitioners | 2 |
Parents | 1 |
Location
Australia | 1 |
Canada | 1 |
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Khosrow-Pour, Mehdi; Herman, Nancy – Electronic Library, 2001
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
Descriptors: Computer Security, Delphi Technique, Electronic Mail, International Law

School Libraries in Canada, 2000
Presents a teaching unit from the Media Awareness Network Web site that introduces students (grades six through nine) to ways in which commercial Web sites collect personal information from children and issues surrounding children and privacy on the Internet. Highlights: objective; learning outcomes; preparation and materials; the lesson; guided…
Descriptors: Child Safety, Children, Class Activities, Computer Security
American Library Association Video/Library Video Network, Towson, MD. – 1997
This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…
Descriptors: Business, Computer Oriented Programs, Computer Security, Computer Use
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality

Smith, Bruce; Fraser, Bruce T.; McClure, Charles R. – Journal of Academic Librarianship, 2000
Considers selected policy instruments related to federal agencies' deployment of information in a Web environment in terms of five key policy areas: access, security, privacy, intellectual property, and records management. Suggests that there are a significant number of policy instruments affecting federal Web site development. Identifies the need…
Descriptors: Access to Information, Computer Security, Document Delivery, Government Publications
Direct Marketing Association, Washington, DC. – 1997
The ability to meet people, visit places around the globe, and make purchases online has added a new dimension to teaching children about the opportunities and accompanying risks that exist in everyday life. The Direct Marketing Association has created this guide to information use, behavior, and privacy on the Internet to help parents supervise…
Descriptors: Computer Attitudes, Computer Security, Electronic Mail, Information Industry
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security
Wright, Peter W. – 2000
Based on the author's presentation at the International Conference on Computer Based Learning in Science, this paper discuses some high profile areas of interest and concern in the educational use of information and communication technology (ICT). The paper is influenced partly by a series of nine government funded "Best Practices"…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Distance Education

Lorenzen, Elizabeth A., Ed. – Reference Librarian, 1996
This volume's topics include librarian role and ethical issues in Internet searching, strategies for locating career resources on the Internet and World Wide Web, career information for "Generation X" and for alumni, collaboration between libraries and university career services, career information gophers, and electronic privacy and…
Descriptors: Career Information Systems, Career Planning, Computer Security, Cooperative Programs
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design