NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,281 to 2,295 of 3,392 results Save | Export
Lascell, David M.; Devane, Mary Ann K. – New Directions for Institutional Advancement, 1982
The decision whether to publish information concerning a given person in institutional public relations efforts must go well beyond consideration of the information's usefulness in the immediate context. Damage to another's reputation or invasion of privacy is both unethical and costly. (MSE)
Descriptors: Ethics, Higher Education, Information Dissemination, Legal Responsibility
Peer reviewed Peer reviewed
McGuire, Patricia – Update on Law-Related Education, 1980
Case studies for secondary school students based on recent federal cases focus on the extent to which a student's right to privacy may be diminished by the school environment. Decisions have been based on the school offical acting in the place of parents and as a state agent. Discussion questions are included. (KC)
Descriptors: Case Studies, Civil Rights, Educational Environment, Privacy
Peer reviewed Peer reviewed
Webb, Stephen D. – Social Behavior and Personality, 1978
Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)
Descriptors: Adults, Foreign Countries, Perception, Privacy
Peer reviewed Peer reviewed
McLuhan, Marshall; Powers, Bruce – Journal of Communication, 1981
Describes some of the problems for the individual inherent in the rapidly expanding computerized field of credit and banking. Proposes that electronic fund transfer systems could virtually replace the use of cash. Warns that while such systems offer wide advantages to business, they threaten the individual's privacy. (JMF)
Descriptors: Automation, Banking, Civil Liberties, Computers
Peer reviewed Peer reviewed
Michigan Law Review, 1978
Concludes that laws prohibiting fornication and cohabitation are unconstitutional. Available from Michigan Law Review, Hutchins Hall, Ann Arbor, MI 48109; single issue $3.50. (Author/IRT)
Descriptors: Civil Liberties, Constitutional Law, Moral Issues, Moral Values
Peer reviewed Peer reviewed
Newborg, Donald L. – Child Welfare, 1979
Provides information on recent decisions in New York courts in cases involving the right of adult adoptees to inspect sealed adoption records. The effect of these decisions is that any change in the right of access to records must be brought about through legislation, not through the courts. (Author/SS)
Descriptors: Adopted Children, Civil Liberties, Confidential Records, Constitutional Law
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Peer reviewed Peer reviewed
Remley, Theodore P., Jr.; Herlihy, Barbara; Herlihy, Scott B. – Journal of Counseling & Development, 1997
Reviews the rationale that underlies privileged communication in counseling and discusses the nature of privilege. Describes the progress of a Supreme Court decision affecting privileged communication between licensed psychotherapists and their patients. Concludes with a legal analysis of the decision and its implications for counselors. (RJM)
Descriptors: Confidential Records, Confidentiality, Counseling, Counselor Client Relationship
Peer reviewed Peer reviewed
Nucci, Larry – New Directions for Child Development, 1997
A personal area of behavior comprising matters of choice and privacy, and differentiated from convention and moral obligation, is a psychological requirement for the construction of a distinct and bounded self. Accurate investigations of this dynamic require differentiation between cultural ideology and conceptual frames of individuals. (Author)
Descriptors: Children, Context Effect, Cultural Influences, Culture
Peer reviewed Peer reviewed
Lewandowski, Judith L. – Journal of School Violence, 2003
Used data collected by a trend analysis company on 111 Web sites commonly visited by children to identify specific privacy issues faced by children when exploring child-oriented and adult-oriented Web sites. Discusses the complexity of issues raised by the expansion of information technology. (SLD)
Descriptors: Children, Data Collection, Information Technology, Internet
Peer reviewed Peer reviewed
Keating, John J., III; Hafner, Arthur W. – Journal of Academic Librarianship, 2002
Describes business techniques for mass marketing, where information technologies are used to target discrete individuals or groups and promote customer interaction. Considers the applicability of business concepts to academic library service, including uniquely identifying patrons, issues of privacy, focusing on the most valuable library services,…
Descriptors: Academic Libraries, Higher Education, Information Technology, Library Services
Peer reviewed Peer reviewed
Petras, Richard T. – Mathematics Teacher, 2001
Introduces RSA, one of the most popular public-key cryptosystems that is used to protect the privacy of computer users. Describes the mathematical foundation of public key cryptography. (KHR)
Descriptors: Cryptography, Curriculum Development, Internet, Mathematical Applications
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Wallace, Richard C. – School Administrator, 1990
Although no school leader likes media coverage of sensitive issues, handling them forthrightly and candidly benefits everyone. The three major facets of an effective media campaign include realistic expectations of the media, personalizing media relations, and controlling both access and message. (MLH)
Descriptors: Administrator Responsibility, Elementary Secondary Education, Expectation, Journalism
Peer reviewed Peer reviewed
Cooper, Stephen – New Jersey Journal of Communication, 1995
States that the right of the public to know and the right of the individual to privacy are inherently in conflict. Examines the relationship between privacy law and the press. Observes that conditions with the birth of new electronic media are similar to those of a century ago, when two lawyers sued for relief from aggressive journalists. (PA)
Descriptors: Conflict, Court Litigation, Freedom of Information, Freedom of Speech
Pages: 1  |  ...  |  149  |  150  |  151  |  152  |  153  |  154  |  155  |  156  |  157  |  ...  |  227