NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,341 to 2,355 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Senter, Joy – Educational Forum, 1981
Examines educational tasks in general computing, including computer-assisted instruction, computer-managed instruction, word processing, secretarial and business applications, time sharing, and networking to larger computers. (CT)
Descriptors: Computer Assisted Instruction, Computer Managed Instruction, Computer Programs, Copyrights
Baer, Richard A., Jr. – Principal, 1982
Notes that both liberals and conservatives have criticized values clarification courses on the grounds that they assume only one correct position regarding values: ethical relativism. Maintains that values clarification fails to live up to its own claims of openness and neutrality. (Author/JM)
Descriptors: Elementary Secondary Education, Ethical Instruction, Moral Values, Privacy
Peer reviewed Peer reviewed
Whitlatch, Jo Bell – RQ, 1979
Reviews recent federal publications on government information, particularly in the area of general informational services, public access to government information and privacy issues, coordination of government information systems, and congressional information needs. (Author)
Descriptors: Annotated Bibliographies, Federal Government, Government Publications, Guides
Dern, Daniel P. – Online, 1997
Online users leave traces that others can find and use. Provides an overview of where and how users leave traces and what users can do to protect their privacy. Discusses Internet accounts; special files ("signature,""plan,""project,""file,""finger,""whois," and "vacation");…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Privacy
Peer reviewed Peer reviewed
Sidbury, Benjamin F. – Journal of College and University Law, 2003
Discusses the U.S. Supreme Court's opinion in Gonzaga University v. Doe, where the Supreme Court held that a person whose records were disclosed has no right to sue the institution for its violation of the Family Educational Rights and Privacy Act of 1974 (FERPA). Explores the decision's ramifications for higher education, including applicable…
Descriptors: Confidential Records, Court Litigation, Disclosure, Higher Education
Peer reviewed Peer reviewed
O'Donnell, Margaret L. – Journal of College and University Law, 2003
Discusses the history of the Family Educational Rights and Privacy Act (FERPA), the Falvo and Gonzaga U.S. Supreme Court cases, and how universities might rethink FERPA in light of digital records. A discussion of Professor Lawrence Lessig's book "Code and Other Laws of Cyberspace" is used as a framework for discussing institutional…
Descriptors: Confidential Records, Court Litigation, Disclosure, Higher Education
Jenkinson, Edward – American School Board Journal, 1989
Teachers should examine classroom questions, assignments, and activities to determine if any of them actually violate rights of student and family privacy. Lists an example of classroom questions that signal possible invasion of privacy, and guidelines for invasion of privacy charges. (MLF)
Descriptors: Elementary Secondary Education, Politics of Education, Privacy, Student Journals
Curran, Robert F. – CAUSE/EFFECT, 1989
Some of the laws, rules, and principles related to student privacy, especially as they relate to the electronic era, are described. Some of the key elements of the Buckley Amendment are detailed and the ethical implications are discussed. (Author/MLW)
Descriptors: College Students, Computers, Confidentiality, Higher Education
Peer reviewed Peer reviewed
Perlman, Gail L. – Social Work, 1988
Discusses the increasing legal regulation of social workers' professional obligation to client confidentiality which means that social workers no longer can rely solely on an ethical commitment to maintaining client privacy. Contends social workers must learn to read and interpret applicable statutes and court decisions both for protection of…
Descriptors: Client Characteristics (Human Services), Compliance (Legal), Confidentiality, Ethics
Estabrook, Leigh S. – Library Journal, 1996
Examines libraries' policies of keeping patron records private and confidential. Addresses the idea that libraries use their automated systems to retain and use patron data to develop and improve library services. Describes uses of patron data that can help libraries develop targeted services to users to better meet their information needs. (JMV)
Descriptors: Confidential Records, Improvement, Library Automation, Library Policy
Peer reviewed Peer reviewed
Melton, Gary B. – American Psychologist, 1991
The overriding concern in the UN Convention on the Rights of the Child is dignity. The implications for mental health policy are discussed. The U.S. may not ratify the convention, but it should serve as a guide for state lawmakers and mental health professionals involved in children's issues. (DM)
Descriptors: Children, Human Dignity, Laws, Mental Health
Peer reviewed Peer reviewed
Jones, Mary Gardiner; Nelson, Helen Ewing – Advancing the Consumer Interest, 1991
New technologies such as audiotex and videotex raise public policy issues related to access, use of a common carrier network, basic versus enhanced services, financing the system, government responsibility, the Bell companies as providers, consumer protection, and privacy. (SK)
Descriptors: Access to Information, Consumer Education, Consumer Protection, Government Role
Larson, Edward J. – National Forum: Phi Kappa Phi Journal, 1993
Two ethical concerns about the Human Genome Project, which aims to sequence all the DNA of a human cell, are discussed: (1) use of germ-line gene therapy to treat perceived hereditary defects or enhance supposed genetic attributes, and (2) personal privacy and potential discrimination arising from possession of individual genetic information. (MSE)
Descriptors: Confidential Records, Ethics, Genetic Engineering, Higher Education
Marcinko, Randall – Searcher, 1998
Describes listservs as communities of individuals who come together on the Internet based on a common interest. Highlights include types of listservs, including those based on specific subjects, supporting products, goal-oriented, disseminating information, and friendship; e-mail filters; lists in the information industry; content quality; privacy…
Descriptors: Computer Mediated Communication, Content Analysis, Electronic Mail, Information Dissemination
Plopper, Bruce – Communication: Journalism Education Today, 1998
Notes that journalists have to balance their desire to print the news with personal rights to privacy. Argues that a working knowledge of ethics and law helps journalism students resolve such issues. Discusses ethical issues; legal aspects of privacy; and "training" administrators. Offers a list of questions to ask, six notable court…
Descriptors: Court Litigation, Ethics, Journalism Education, News Reporting
Pages: 1  |  ...  |  153  |  154  |  155  |  156  |  157  |  158  |  159  |  160  |  161  |  ...  |  227