NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,401 to 2,415 of 3,392 results Save | Export
Powers, David E. – Creative Computing, 1980
A wide range of computer crimes and the need for computer security are discussed. (MK)
Descriptors: Computer Programs, Computer Science, Computer Storage Devices, Computers
Peer reviewed Peer reviewed
Webb, Ralph, Jr. – Communication Education, 1979
Identifies and discusses three current and emerging problems in graduate admissions: lack of understanding by applicants about admissions procedures, lack of information available to applicants about graduate programs, and lack of information about applicants available to those persons making decisions about admissions and appointments. (JMF)
Descriptors: Academic Standards, Admission Criteria, Admissions Counseling, Grade Inflation
Peer reviewed Peer reviewed
Kenrick, Douglas T.; And Others – Journal of Personality and Social Psychology, 1979
Descriptors: Altruism, Children, Early Childhood Education, Helping Relationship
Peer reviewed Peer reviewed
Nisenoff, Norman; And Others. – Information Processing and Management, 1979
Considers the implications of possible policy initiatives in the United States in light of Swedish experience in dealing with the privacy of computerized records. (CWM)
Descriptors: Case Studies, Confidential Records, Confidentiality, Federal Regulation
Peer reviewed Peer reviewed
Conklin, Kenneth R. – Educational Theory, 1976
This philosopher argues that ideally there should be no general right to informational or observational privacy. (MM)
Descriptors: Academic Records, Case Records, Confidential Records, Confidentiality
Peer reviewed Peer reviewed
Beverage, James – Duke Law Journal, 1976
The Privacy Act seeks to preserve the individual's interest in privacy while recognizing the legitimate needs of government for information. A general explanation of the manner in which these rights are protected by this act is offered. (LBH)
Descriptors: Civil Liberties, Confidentiality, Court Litigation, Federal Legislation
Peer reviewed Peer reviewed
Petronio, Sandra; Flores, Lisa A.; Hecht, Michael L. – Western Journal of Communication, 1997
Explores the concept of voice by turning to disclosure discourse about sexual abuse. Argues that sexually abused children are strategic and logical in the way they regulate access to this private information. Notes that the children locate their voice of logic in their selection of confidants. States that researchers can position themselves as…
Descriptors: Child Abuse, Communication Research, Discourse Communities, Privacy
Strickland, Lee S. – Bulletin of the American Society for Information Science and Technology, 2002
Discussion of information and the war on terrorism following the September 11th attacks focuses on a survey of legal provisions and new security-related practices in government and business as security competes with civil liberties. Topics include the Fourth Amendment overseas; Department of Justice legal initiatives; military tribunals; security…
Descriptors: Civil Liberties, Federal Legislation, Immigration, Information Utilization
Peer reviewed Peer reviewed
Gellman, Robert – Government Information Quarterly, 2002
Discusses implications of the U.S.A. Patriot Act, antiterrorism legislation that was passed after the September 11 attacks, regarding privacy issues. Highlights include information privacy; privacy and government, including increases in the surveillance powers of government; privacy and the private sector; and future possibilities. (Author/LRW)
Descriptors: Federal Legislation, Futures (of Society), Government Role, Information Policy
Peer reviewed Peer reviewed
Danielson, Elena S. – Reference Librarian, 1997
While revised ethical codes provide helpful guidelines, reference archivists face many ethical questions raised by rapidly evolving technology, changing expectations, and inconsistent privacy laws that have no clear answers. Discusses issues related to reference searching, codification of ethics, cultural property and the responsibility of…
Descriptors: Archives, Change, Ethics, Information Seeking
Vail, Kathleen – American School Board Journal, 1997
The national attitude about the confidentiality of juvenile criminal records is changing. Between 1992 and 1995, legislatures in 13 states ordered notification of juvenile offenses be given to schools. Many in the school community laud these new school notification laws as a way to protect teachers and other students from potentially violent…
Descriptors: Confidential Records, Delinquency, Due Process, Elementary Secondary Education
Sultanik, Jeffrey, T. – School Business Affairs, 1997
E-mail has created friction between school districts' proprietary needs and employees' privacy rights. This article examines e-mail law (constitutional, statutory, and common) and issues (employer monitoring, discover problems, admissibility, and attorney-client privilege) and provides policy guidelines. The 1996 Communications Decency Act,…
Descriptors: Electronic Mail, Elementary Secondary Education, Internet, Legal Problems
Peer reviewed Peer reviewed
Tu, Chih-Hsiung; McIsaac, Marina – American Journal of Distance Education, 2002
Studied social presence in an online learning environment and focused on three elements: social context, online communication, and interactivity: that emerged as important in establishing a sense of community among online learners. Discusses the privacy factor, learner characteristics, computer-mediated communication, and course design.…
Descriptors: Computer Mediated Communication, Interaction, Interpersonal Competence, Interpersonal Relationship
Peer reviewed Peer reviewed
Fifarek, Aimee – Online Information Review, 2002
Describes potential situations where patron privacy can be endangered by the presence of information technology and how academic librarians can protect patron information and prepare patrons for safe information seeking in the online world. Discusses the USA PATRIOT Act, search warrants, and acceptable use policy. (Author/LRW)
Descriptors: Academic Libraries, Federal Legislation, Higher Education, Information Seeking
Van Horn, Royal – Phi Delta Kappan, 2002
Argues that 1998 Digital Millennium Copyright Act, providing increased protection against unauthorized access to copyrighted electronic media, and the Sonny Bono Copyright Term Extension Act, extending the term of most copyrighted books, unduly burden users of electronic media and books. Discusses the negative impact of recent federal laws to…
Descriptors: Child Safety, Copyrights, Elementary Secondary Education, Fair Use (Copyrights)
Pages: 1  |  ...  |  157  |  158  |  159  |  160  |  161  |  162  |  163  |  164  |  165  |  ...  |  227