NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,086 to 2,100 of 3,392 results Save | Export
Computer and Business Equipment Manufacturers Association, Washington, DC. – 1979
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
Descriptors: Bibliographies, Computers, Data Processing, Information Systems
Peer reviewed Peer reviewed
Ferguson, Lucy Rau – Journal of Social Issues, 1978
This paper holds that children should participate in research only under conditions of adequately informed consent, that parents must be fully informed about research procedures and purposes, but that parental consent is a sufficient condition only for children without adequate capacity for informed choice. (Author)
Descriptors: Child Welfare, Experiments, Parent Role, Participation
Siehl, George – Library Journal, 1972
From sampling the sensational and the scholarly literature cited in this article, one can piece together a representative picture of the American intelligence community. (42 references) (Author/NH)
Descriptors: Annotated Bibliographies, Books, Federal Government, Fiction
Flygare, Thomas J. – Phi Delta Kappan, 1979
The legality of warrantless searches of students depends on the kind of search that takes place and what happens to any evidence obtained during the search. (Author/IRT)
Descriptors: High School Students, Privacy, Search and Seizure, Secondary Education
Marwick, Christine M. – Library Journal, 1979
Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)
Descriptors: Censorship, Confidentiality, Federal Regulation, Information Dissemination
Peer reviewed Peer reviewed
Friedman, Batya – Computers in Human Behavior, 1997
Describes two complementary studies that were conducted to understand the diverse views adolescents hold regarding electronic information. One study examined high school students' concepts of property pertaining to copying computer programs; the other examined concepts of privacy pertaining to accessing computer files. (56 references) (Author/LRW)
Descriptors: Adolescents, Computer Software, Privacy, Secondary Education
Shieh, Jackie; Ballard, Rhea A-L – EDUCOM Review, 1994
Examines the relationship between electronic mail (E-mail) and employee privacy rights. Two current course cases involving the privacy issue are summarized; the Electronic Communications Privacy Act of 1986 is explained; proposed legislation is discussed; and suggestions for employee E-mail privacy that can help avoid possible litigation are…
Descriptors: Court Litigation, Electronic Mail, Federal Legislation, Legal Responsibility
Peer reviewed Peer reviewed
Sethna, Beheruz; Barnes, Cynthia C.; Brust, Melvin; Kaye, Lory – Journal of Education for Business, 1999
Responses from 134 of 301 accredited business schools showed the following: (1) 58% had policies on electronic communication; (2) only 9% of administrators accessed faculty e-mails; and (3) 69% believed administrators should have access if they suspected offensive information, whereas only 46% considered prevention of institutional liability a…
Descriptors: Educational Administration, Electronic Mail, Higher Education, Privacy
Daly, Janet – Proceedings of the ASIS Annual Meeting, 2000
Provides an overview of a planned session to describe the work of the World Wide Web Consortium, including technical specifications for HTML (Hypertext Markup Language), XML (Extensible Markup Language), CSS (Cascading Style Sheets), and over 20 other Web standards that address graphics, multimedia, privacy, metadata, and other technologies. (LRW)
Descriptors: Computer Graphics, Consortia, Metadata, Privacy
Peer reviewed Peer reviewed
Sampson, James P., Jr.; Lumsden, Jill A. – Journal of Career Assessment, 2000
Addresses ethical issues regarding Internet career assessment: reliability, validity, user readiness, administration, lack of practitioner awareness, equitable access, confidentiality, and privacy. Makes recommendations in the areas of research and development, training, standards, and stable funding of assessment development. (SK)
Descriptors: Career Counseling, Ethics, Internet, Privacy
Peer reviewed Peer reviewed
Blaszczynski, Carol – Delta Pi Epsilon Journal, 1998
Defines ethical research and associated terms: codes of ethics, informed consent, privacy, confidentiality, and data treatment. Addresses issues in the dissemination of research results, such as plagiarism and authorship. (SK)
Descriptors: Business Education, Confidentiality, Educational Research, Ethics
Kresses, Mamie – Principal, 2001
Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)
Descriptors: Elementary Secondary Education, Federal Legislation, Internet, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Ziff, Matthew – Journal of Aesthetic Education, 2004
Advances in glass technologies are being applied in contemporary interior architecture. Glass forms and surfaces are appearing in settings and applications that offer vivid aesthetic experiences for users, but create ambiguous messages concerning community and privacy. Where a modernist application of glass may have been directed toward creating a…
Descriptors: Architecture, Structural Elements (Construction), Aesthetics, Interior Space
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Goldsborough, Reid – Black Issues in Higher Education, 2004
There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…
Descriptors: Internet, Electronic Mail, Computer Mediated Communication, Computer Security
Pages: 1  |  ...  |  136  |  137  |  138  |  139  |  140  |  141  |  142  |  143  |  144  |  ...  |  227