NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,311 to 2,325 of 3,403 results Save | Export
Peer reviewed Peer reviewed
Smith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Peer reviewed Peer reviewed
Kupritz, Virginia W. – Journal of Industrial Teacher Education, 2000
Develops a model for privacy regulation in workplaces that identifies three elements: environmental mechanisms (physical elements of workspaces), behavioral mechanisms (overt and cognitive behaviors expressing territoriality or adaptation), and social mechanisms (organizational policy and social supports for individual and group privacy. (Contains…
Descriptors: Behavior Patterns, Employment Practices, Interpersonal Relationship, Organizational Development
Lifto, Don – American School Board Journal, 2001
Increasing numbers of school employees are stumbling and/or crashing and burning on the Internet superhighway. Employees should understand that their e-mail and Internet accounts are not really theirs or private, since their employer pays for access for work purposes. Storing, sending, or forwarding inappropriate messages is verboten. (MLH)
Descriptors: Electronic Mail, Elementary Secondary Education, Employee Responsibility, Ethics
Van Horn, Royal – Phi Delta Kappan, 2000
Peeping software takes several forms and can be used on a network or to monitor a certain computer. E-Mail Plus, for example, hides inside a computer and sends exact copies of incoming or outgoing e-mail anywhere. School staff with monitored computers should demand e-mail privacy. (MLH)
Descriptors: Computer Software, Electronic Mail, Elementary Secondary Education, Internet
Baskin, Joy Surratt; Surratt, Jim – School Administrator, 2001
Citing new provisions of Family Educational Rights and Privacy Act, discusses legal limitations and exceptions to posting personally identifiable student information on a school district's Web site. (PKP)
Descriptors: Elementary Secondary Education, Privacy, School Law, State Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Somerville, Margaret A. – Canadian Journal on Aging, 2004
There are at present two inconsistencies with respect to the sharing of personal health information (PHI) among health care professionals caring for a patient whom the information concerns. First, there is an inconsistency between what is in theory the ethics and law governing the confidentiality and privacy of this information--it may only be…
Descriptors: Patients, Confidentiality, Ethics, Privacy
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Bowers, Stacey L. – Journal of Academic Librarianship, 2006
This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."
Descriptors: Privacy, Libraries, Library Services, Library Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Cumper, Peter – Sex Education: Sexuality, Society and Learning, 2004
The Human Rights Act 1998 is the most significant British statute to have been passed in the last decade. It has already been the catalyst for a series of high profile cases, ranging from the privacy rights of celebrities ("Douglas v Hello!" [2001] QB 967) to the Home Secretary's sentencing powers in murder cases ("R (Anderson) v…
Descriptors: Office Occupations, Civil Rights, Sex Education, Court Litigation
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Peer reviewed Peer reviewed
Direct linkDirect link
Rager, Kathleen B. – International Journal of Qualitative Studies in Education (QSE), 2007
This article reports the findings from a secondary analysis of the data from two qualitative studies conducted by the researcher regarding the self-directed learning experiences of prostate and breast cancer patients. Of interest were possible differences in the descriptions of the participants' experiences that appear to relate to gender.…
Descriptors: Patients, Geographic Location, Cancer, Qualitative Research
Firestone, Charles M., Ed.; Schement, Jorge Reina, Ed. – 1995
This book is an attempt to express rudimentary "first principles" in the application of democratic values to some of the most pressing issues inherent in the advent of a new information society. Its purpose is not to advance any particular political slant, but rather, to incorporate a balance of democratic values--libertarian,…
Descriptors: Civil Liberties, Communication (Thought Transfer), Copyrights, Democratic Values
Acker, Stephen R. – 1983
Interactive cable television systems take advantage of the ability of coaxial cables to transmit information in two directions. QUBE in Columbus, Ohio, and Project Ida in Canada use cable's interactive ability to provide a variety of services. QUBE allows electronic "town meetings" and provides access to stock quotes, newspaper…
Descriptors: Cable Television, Federal Regulation, Futures (of Society), Mass Media Effects
Walsh, Frank – 1988
This monograph synthesizes the laws and regulations that form the basis of the right to representation in the court of public opinion by all who would seek to influence public and private decisions. It expresses the framework of human and social values that underlie this constitutional freedom and that give public relations and other management…
Descriptors: Advertising, Copyrights, Financial Services, Freedom of Information
Mundt, Whitney R. – 1980
Canon 35 of the American Bar Association's Canons of Judicial Ethics is an advisory ban on cameras and news equipment in courtrooms. In 1978, the Louisiana Supreme Court authorized a one-year pilot project on electronic coverage of court proceedings. The authorization set forth certain technical requirements concerning the nature and placement of…
Descriptors: Court Doctrine, Court Litigation, Ethics, Freedom of Speech
Pages: 1  |  ...  |  151  |  152  |  153  |  154  |  155  |  156  |  157  |  158  |  159  |  ...  |  227