Publication Date
| In 2026 | 0 |
| Since 2025 | 173 |
| Since 2022 (last 5 years) | 606 |
| Since 2017 (last 10 years) | 1235 |
| Since 2007 (last 20 years) | 2110 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Weinberger, JoAnn – 1981
Since 1972, the issue of human rights protection has grown in complexity and intensity. Congress has passed four laws: Family Educational Rights and Privacy Act of 1974; Freedom of Information Act, as amended; Privacy Act of 1974; and National Research Act of 1974. From 1971-1980, the Department of Health, Education and Welfare (DHEW) and then the…
Descriptors: Federal Legislation, Federal Regulation, Privacy, Research Problems
Peer reviewedBeiswinger, George L. – Family Coordinator, 1979
The anatomy of a recent High Court case reveals how a potpourri of legal input and reasoning resulted in a decision that could strike a blow for both understanding and positive action in the emotionally-laden, controversial area of teenage sexuality. (Author)
Descriptors: Adolescents, Court Litigation, Privacy, Sex Education
Rice, John D. – Personnel Administrator, 1978
By considering current practices in light of existing and expected laws, this article develops some generally applicable guidelines for both requesters and providers of employment reference information. (Author/IRT)
Descriptors: Administrators, Federal Legislation, Guidelines, Personnel Data
Peer reviewedSimpson, Evan – Educational Theory, 1986
This article reviews values clarification theory and goes beyond its explicit doctrines to discuss shortcomings. (MT)
Descriptors: Goal Orientation, Moral Development, Privacy, Values Clarification
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy
Shachtman, Tom – Media and Methods, 1977
Reflects on the exploitation of documentary film subjects--the dangers it poses as well as the responsibilities it presents. (Author/KS)
Descriptors: Documentaries, Ethics, Films, Privacy
Conable, Gordon – American Libraries, 1990
Discusses investigation of librarians by the FBI (Federal Bureau of Investigation) and the status of the Library Awareness Program. An American Library Association (ALA) resolution opposing FBI activities in libraries and demanding release of individual files to persons subjected to checks is described. A model letter for individuals to use in…
Descriptors: Freedom of Information, Librarians, Library Associations, Privacy
Kennedy, Mike – American School & University, 2000
Discusses the integration of the school intercom system with phones in the classroom to enhance main office to classroom communication with an element of privacy. The contribution of classroom phones to safety and security issues is highlighted. (GR)
Descriptors: Communications, Elementary Secondary Education, Privacy, Public Schools
Markell, Ginny – Our Children, 2000
Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…
Descriptors: Elementary Secondary Education, Internet, Parent Responsibility, Privacy
Peer reviewedExtejt, Marian M. – Business Communication Quarterly, 1998
Discusses current standards for formatting and etiquette of electronic mail in the business setting. Discusses privacy and appropriate content. Notes that class assignments involving electronic mail provide practical opportunities to develop ease with this form. (SR)
Descriptors: Business Communication, Electronic Mail, Higher Education, Privacy
Peer reviewedDe Maeyer, Dirk – Internet Research, 1997
Examines the Internet's potential for becoming an information highway. Highlights include definitions of the information highway and the Internet; the infrastructure of an information highway; capacity; connectivity; simultaneity; network protocols; applications; interactivity; openness; mobility and remote access; universal access; affordable…
Descriptors: Access to Information, Computer Security, Internet, Privacy
Reynolds, Ben – Technology & Learning, 2005
"Sleazeware" is the authors' term for spyware, adware, malware, trackware, foistware, trojans, and other programs that sleaze into computers, either as a hidden component or by tricking someone into downloading them. Once in the machine, the program phones home for purposes ranging from simply reporting where people browse to downloading…
Descriptors: Information Retrieval, Internet, Privacy, Computer Security
Federal Trade Commission, 2009
This booklet gives adults practical tips to help kids navigate the online world. Kids and parents have many ways of socializing and communicating online, but they come with certain risks. This guide encourages parents to reduce the risks by talking to kids about how they communicate--online and off--and helping kids engage in conduct they can be…
Descriptors: Risk, Internet, Computer Mediated Communication, Teaching Methods
Torres, Mario S., Jr.; Stefkovich, Jacqueline A. – Educational Administration Quarterly, 2009
Purpose: A factor largely overlooked amid the press for greater security in schools is the extent to which law enforcement participates in search and seizure and the implications such actions carry for student civil liberties. As case law suggests, police engaged in school searches may be held to the probable cause standard or the more flexible…
Descriptors: Educational Environment, Law Enforcement, Police, Intervention
Malerba, Cathy – Online Submission, 2007
This report summarizes external research requests submitted to and reviewed by Austin Independent School District staff during the 2006-2007 school year.
Descriptors: School Districts, Research Proposals, Educational Research, Program Evaluation

Direct link
