Publication Date
| In 2026 | 0 |
| Since 2025 | 184 |
| Since 2022 (last 5 years) | 617 |
| Since 2017 (last 10 years) | 1246 |
| Since 2007 (last 20 years) | 2121 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| Australia | 81 |
| United States | 80 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 28 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reed, Martha S. – Communication: Journalism Education Today (C:JET), 1982
Shares some familiar quotations from those who cherished the freedoms protected by the First Amendment, relates stories about some of the newsgathering operations around the country, and reports on what happened at the First Amendment Congresses held in 1980 and the recommendations made by that body. (HOD)
Descriptors: Accountability, Citizenship Responsibility, Civil Liberties, Ethics
Peer reviewedLucas, Wayne L. – Journal of Alcohol and Drug Education, 1980
Guidelines for protection of human subjects in survey research demand that research designs provide for subjects'"informed consent." This paper reports procedures employed within a study of marijuana and other drug use which were in compliance yet avoided problems of nonparticipation and the gathering of inaccurate information. (Author)
Descriptors: College Students, Data Collection, Drug Use, Experimental Groups
Windhauser, John W. – College Press Review, 1980
Indicates that a university community generally is quite approving of the campus daily newspaper as long as the editors avoid publishing too much "personal" news which tends to be unfavorable. Suggests that complaints about student newspapers might be the result of publishing factual types of stories rather than editorials. (RL)
Descriptors: Disclosure, Higher Education, News Reporting, Privacy
Peer reviewedSandlow, Jeff M. – San Diego Law Review, 1979
The "Doe" court unanimously prescribed a constitutional right to protect confidential parent-child communications. This right both arises out of and buttresses the firmly established rights to family privacy and autonomy already enumerated by the Supreme Court. Available from San Diego Law Review Association, University of San Diego…
Descriptors: Communication (Thought Transfer), Confidentiality, Constitutional Law, Court Litigation
Peer reviewedMcKay, John – Arkansas Law Review, 1979
When Congress reasonably decides that warrantless administrative inspections are necessary to effectuate its acts, and the acts provide privacy safeguards as effective as those provided by a judicially issued administrative search warrant, Congress's decision should be respected. Available from Arkansas Law Review, School of Law, University of…
Descriptors: Administrative Agencies, Civil Liberties, Federal Regulation, Industry
Peer reviewedShipley, David E. – Ohio State Law Journal, 1979
Four distinct classes of cases are the recognized exceptions to the requirement of warrants for searches: emergency inspections, plain view, consensual, and the "Colonnade-Biswell" exception for pervasively regulated industries. Available from the Ohio State University School of Law, 1659 North High Street, Columbus, Ohio 43210; $3.50…
Descriptors: Administrative Agencies, Civil Liberties, Federal Regulation, Industry
Neustadt, Richard M. – Library Journal, 1979
Describes the movement toward establishing a national information policy, especially in the areas of privacy and international concerns. Considered are the effects of the information technology explosion on individuals, mass media, institutions, and public libraries. (SW)
Descriptors: Conferences, Information Dissemination, International Relations, Libraries
Powers, David E. – Creative Computing, 1980
A wide range of computer crimes and the need for computer security are discussed. (MK)
Descriptors: Computer Programs, Computer Science, Computer Storage Devices, Computers
Peer reviewedWebb, Ralph, Jr. – Communication Education, 1979
Identifies and discusses three current and emerging problems in graduate admissions: lack of understanding by applicants about admissions procedures, lack of information available to applicants about graduate programs, and lack of information about applicants available to those persons making decisions about admissions and appointments. (JMF)
Descriptors: Academic Standards, Admission Criteria, Admissions Counseling, Grade Inflation
Peer reviewedKenrick, Douglas T.; And Others – Journal of Personality and Social Psychology, 1979
Descriptors: Altruism, Children, Early Childhood Education, Helping Relationship
Peer reviewedNisenoff, Norman; And Others. – Information Processing and Management, 1979
Considers the implications of possible policy initiatives in the United States in light of Swedish experience in dealing with the privacy of computerized records. (CWM)
Descriptors: Case Studies, Confidential Records, Confidentiality, Federal Regulation
Peer reviewedConklin, Kenneth R. – Educational Theory, 1976
This philosopher argues that ideally there should be no general right to informational or observational privacy. (MM)
Descriptors: Academic Records, Case Records, Confidential Records, Confidentiality
Peer reviewedBeverage, James – Duke Law Journal, 1976
The Privacy Act seeks to preserve the individual's interest in privacy while recognizing the legitimate needs of government for information. A general explanation of the manner in which these rights are protected by this act is offered. (LBH)
Descriptors: Civil Liberties, Confidentiality, Court Litigation, Federal Legislation
Peer reviewedPetronio, Sandra; Flores, Lisa A.; Hecht, Michael L. – Western Journal of Communication, 1997
Explores the concept of voice by turning to disclosure discourse about sexual abuse. Argues that sexually abused children are strategic and logical in the way they regulate access to this private information. Notes that the children locate their voice of logic in their selection of confidants. States that researchers can position themselves as…
Descriptors: Child Abuse, Communication Research, Discourse Communities, Privacy
Strickland, Lee S. – Bulletin of the American Society for Information Science and Technology, 2002
Discussion of information and the war on terrorism following the September 11th attacks focuses on a survey of legal provisions and new security-related practices in government and business as security competes with civil liberties. Topics include the Fourth Amendment overseas; Department of Justice legal initiatives; military tribunals; security…
Descriptors: Civil Liberties, Federal Legislation, Immigration, Information Utilization


