NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,161 to 2,175 of 3,392 results Save | Export
Peer reviewed Peer reviewed
Silin, Jonathan G. – Teachers College Record, 1987
Because Acquired Immune Deficiency Syndrome has been construed as a disease of the "other" who is somehow not part of society, efforts at education are destined to fail. Individual rights can easily be suborned to the perceived public good. Educators are urged to grapple with the ethical issues. (MT)
Descriptors: Acquired Immune Deficiency Syndrome, Ethics, Health Education, Privacy
Peer reviewed Peer reviewed
Gubrium, Jaber F.; Holstein, James A. – Journal of Marriage and the Family, 1987
Considers the private image in family studies for its methodological assumptions and implications. Recasting the assumptions in terms of descriptive practice presents an alternative approach that construes family order as bound to organized, collective representation. Offers field data in illustration, and addresses procedural and theoretical…
Descriptors: Family Characteristics, Family Life, Family Relationship, Phenomenology
Peer reviewed Peer reviewed
Reamer, Frederic G. – Social Work, 1986
Discusses the complex ethical dilemmas in social work brought about by the availability of technology. Addresses the issues of privacy, behavior control, and health care. Considers the allocation and possible misuse of technology. (Author/ABB)
Descriptors: Behavior Modification, Ethics, Health Services, Moral Issues
Peer reviewed Peer reviewed
Johnson, Jeffery L.; Crowley, Donald W. – Educational Theory, 1986
In New Jersey v. T.L.O., the Supreme Court found that students have a right to personal privacy but that school officials need not obtain warrants to conduct searches if suspicion of wrongdoing is reasonable. The authors argue that the Court undervalues privacy and that students' right to privacy should be increased. (MT)
Descriptors: Elementary Secondary Education, Privacy, School Policy, Search and Seizure
Barbour, Alton – 2002
This paper provides examples of polygraph misuses; details the increasing use of the polygraph inside and outside of law enforcement; explains what a polygraph is, what a typical polygraph test might consist of and its weaknesses in the detection of truth; and analyzes the available research with specific reference to the validity and reliability…
Descriptors: Civil Liberties, Higher Education, Law Related Education, Laws
Peer reviewed Peer reviewed
Hildreth, Gladys J.; Hoyt, Carolyn D. – Journal of Home Economics, 1981
Explores the broad meaning of the term "privacy" and focuses on ways teachers and parents can help create social and physical settings whereby young children can live and work as free-functioning individuals. (CT)
Descriptors: Childhood Needs, Family Environment, Parent Responsibility, Privacy
Peer reviewed Peer reviewed
Harris, Thomas L. – Journal for Specialists in Group Work, 1980
Examined the relationship between willingness to self-disclose in a group and trust. Participants with high trust levels were more willing to self-disclose than participants with low trust levels. (Author)
Descriptors: Counselors, Credibility, Group Dynamics, Peer Groups
Peer reviewed Peer reviewed
McGuire, Joseph P.; Leak, Gary K. – Journal of Clinical Psychology, 1980
Prior theory and research have suggested that self-disclosure may have a curvilinear relationship with psychological disturbance. The present study investigated this hypothesis. Results offer partial support for the hypothesis and add substantially to the external validity of prior research. (Author)
Descriptors: Criminals, Emotional Disturbances, Males, Personality Assessment
Linowes, David F. – Personnel Administrator, 1980
Discusses the results of a survey of the policies companies have adopted to protect confidential employee data and the findings of the U.S. Privacy Protection Study Commission. (Author/IRT)
Descriptors: Confidential Records, Confidentiality, Employees, Organizations (Groups)
Adams, David L. – Scholastic Editor, 1980
Explains in basic terms legal principles that form the bases for libel and invasion of privacy--all of which should be known to those involved in the process of publishing or broadcast of student media. (HOD)
Descriptors: Accountability, Freedom of Speech, Legal Responsibility, Privacy
Burkoff, John M. – Oregon Law Review, 1979
Highlights some areas of Fourth Amendment doctrinal inconsistencies in Supreme Court decisions and recommends how these inconsistencies can and should be resolved. Available from School of Law, University of Oregon, Eugene, Oregon 97403. (Author/IRT)
Descriptors: Civil Liberties, Constitutional Law, Privacy, Search and Seizure
Peer reviewed Peer reviewed
Freese, Jan – Journal of Communication, 1979
Argues that the flow of data within and across national borders involves problems that need to be regulated by law. Calls for international cooperation to insure that society is protected from abuses of data flow. (PD)
Descriptors: Information Dissemination, Information Networks, International Law, International Relations
Peer reviewed Peer reviewed
Creim, William B. – Southern California Law Review, 1979
The Buckley Amendment limits the right of access to letters of recommendation only to admitted students and allows schools to request that applicants sign a waiver of their access rights. Statutory amendment is the best way to correct this "catch 22" situation. Available from The Law Center, University of Southern California, University…
Descriptors: Admission (School), College Applicants, Confidential Records, Higher Education
Peer reviewed Peer reviewed
Gannon-Leary, Pat – Electronic Library, 1997
As a result of litigation, a number of companies have written policies declaring the right to monitor employee electronic communication. Discusses reasons why employers monitor employee e-mail, the prevalence of monitoring in universities, use and ethics policy statements, and bills of rights statements protecting employee privacy. (PEN)
Descriptors: Electronic Mail, Ethics, Higher Education, Information Policy
Peer reviewed Peer reviewed
Bushong, Sara – Teacher Librarian, 2002
Presents general statistical findings of Internet use by children, discusses the recent Children's Online Privacy Protection Act (COPPA), and summarizes online child safety considerations. Considers filtering and includes current resources for parents and children. (Author/LRW)
Descriptors: Children, Federal Legislation, Internet, Parent Participation
Pages: 1  |  ...  |  141  |  142  |  143  |  144  |  145  |  146  |  147  |  148  |  149  |  ...  |  227