Publication Date
| In 2026 | 0 |
| Since 2025 | 173 |
| Since 2022 (last 5 years) | 606 |
| Since 2017 (last 10 years) | 1235 |
| Since 2007 (last 20 years) | 2110 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedSalton, Gerard – Journal of the American Society for Information Science, 1980
Describes the role of information privacy in modern society, examines recent legal cases to illustrate how privacy cases are adjudicated and to identify the limits of available privacy protection, and raises issues regarding techniques for insuring data confidentiality. (FM)
Descriptors: Civil Liberties, Confidentiality, Databases, Legal Problems
Peer reviewedHeintz, Alden – Journal of Communication, 1979
Presents an industry point of view on transborder data flow and gives recommendations for an objective evaluation of its importance. (PD)
Descriptors: Government Role, Industry, Information Dissemination, Information Networks
Peer reviewedDwight, Stephen A.; Alliger, George M. – Educational and Psychological Measurement, 1997
A total of 102 undergraduates rated overt test integrity items on the dimensions of invasion of privacy, ease of faking, and job relatedness. Items that required direct admission of counterproductive behaviors were identified as the most invasive but also the easiest to fake. Implications for test construction and future research are discussed.…
Descriptors: Higher Education, Integrity, Privacy, Student Attitudes
Peer reviewedGeevarghese, Salin G. – Journal of Law and Education, 1996
Explores the background of open records acts and discusses the case law that deals with open records litigation against university foundations. Sets forth a summary of selected academic research that has developed on the open records question and suggests several methods of analyzing foundation open records problems. Concludes with recommendations…
Descriptors: Confidential Records, Court Litigation, Higher Education, Philanthropic Foundations
Peer reviewedOppenheim, Charles – Journal of Information Science, 1996
Discusses the development a national information policy in the United Kingdom (UK): policies for national information infrastructures, electronic information services, privacy and data protection, copyright, public and national libraries; reviews problems inhibiting Internet use; compares the UK's and the European Commission's approaches to…
Descriptors: Computer Security, Copyrights, Foreign Countries, Information Policy
Peer reviewedKatz, James E. – Society, 1997
Explores the social issues, including manners, security, crime (fraud), and social control associated with information networking, with emphasis on the Internet. Also addresses the influence of cellular phones, the Internet and other information technologies on society. (GR)
Descriptors: Information Networks, Information Technology, Internet, Privacy
Peer reviewedGlosoff, Harriet L.; Pate, Robert H., Jr. – Professional School Counseling, 2002
To be effective advocates for their clients' rights, school counselors must have a good grasp of issues related to the following concepts: the legal status of minors and the ethics of privacy, confidentiality, privileged communication, and informed consent. Each of these is reviewed along with relevant ethical standards and factors that complicate…
Descriptors: Confidentiality, Counselor Role, Ethics, Laws
Sagarese, Margaret; Giannetti, Charlene – Our Children, 2003
Polled adolescents, parents, and teachers to determine where the child's right to privacy ends and the parent's responsibility to protect begins. Results indicate that the worst offenders tend to be siblings. The paper presents a three-pronged strategy to help parents deal with battling children: recognize the breaches, negotiate the truce…
Descriptors: Family Environment, Interpersonal Relationship, Parent Responsibility, Personal Space
Reeder, Franklin S. – Information Management Review, 1989
Describes the role of the Office of Management and Budget with respect to federal information resources management and defines issues in information resource management policy. Issues discussed include information integrity; the individual's right to freedom; information dissemination functions; and information as a strategic resource. (29…
Descriptors: Federal Government, Federal Legislation, Information Dissemination, Policy Formation
Carpenter, Cal – Learning & Leading with Technology, 1996
Considers ethics issues involved with using online resources like the Internet in elementary and secondary education and suggests that educators initiate and model a standardized role of ethical behavior for Internet users. Topics include hackers; privacy, piracy, and security; screening electronic sites; ethics education; and an ethics model.…
Descriptors: Computer Security, Elementary Secondary Education, Ethics, Internet
Peer reviewedJones, Robert Alun – Internet Research, 1994
Notes that research on the use of networked information resources, like any kind of social science involving the study of human subjects, raises ethical questions. The tension between traditional research guidelines and new technologies is discussed; public/private distinctions and informed consent are addressed; and possible solutions are…
Descriptors: Computer Networks, Definitions, Ethics, Guidelines
Peer reviewedJanangelo, Joseph – Computers and Composition, 1991
Examines the exploitation of individuals that occurs within writing classrooms by those who organize computer systems. Discusses these abuses in three categories: teachers observing students, teachers observing teachers, and students observing students. Shows how computer-enhanced writing environments, if not designed carefully, can inhibit as…
Descriptors: Classroom Environment, College English, Computers, Educational Technology
Peer reviewedCraig, Cheryl J. – Journal of Curriculum and Supervision, 1998
A teacher working in a school with an open-door policy discusses some difficulties with this arrangement. She had trouble finding a private place, including the staff room, to talk intimately with other teachers, had to build her schedule around parent helpers, and noted some unethical treatment of children. Parent involvement is no elixir. The…
Descriptors: Collegiality, Elementary Education, Ethics, Faculty Workload
Collins, Mildred; Morales, Arturo; Dowell, Mary – American School Board Journal, 1999
Natural disasters, violent confrontations, and other crises will bring in police or firefighters, followed quickly by the press and the public. School officials should respond carefully and appropriately. Solutions (and examples from California law) pertaining to privacy rights, workplace safety, sex offenders, background checks, and communication…
Descriptors: Crisis Management, Elementary Secondary Education, Legal Responsibility, Mass Media
Peer reviewedKupritz, Virginia W. – Journal of Industrial Teacher Education, 1999
Interviews with 12 older (ages 60 to 78) and 12 younger (ages 38 to 53) administrators showed that they had similar perceptions of the physical features and privacy issues in the workplace that facilitate or impede work. Structural accommodations may not be necessary for older workers, but attention to design and privacy issues is necessary for…
Descriptors: Human Factors Engineering, Job Performance, Older Workers, Physical Environment


