NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,836 to 2,850 of 3,386 results Save | Export
DeLay, Jeanine A. – 1987
An overview of six major issues in computer ethics is provided in this paper: (1) unauthorized and illegal database entry, surveillance and monitoring, and privacy issues; (2) piracy and intellectual property theft; (3) equity and equal access; (4) philosophical implications of artificial intelligence and computer rights; (5) social consequences…
Descriptors: Artificial Intelligence, Case Method (Teaching Technique), Case Studies, Computers
Brickhouse, Nancy W. – 1989
The desire to abolish the gap between research theory and classroom practice has sparked an increasing interest in field-based research among science educators. Although most researchers are aware of the standard meanings of informed consent and confidentiality, and there are some codes of ethical principles published by such groups as the…
Descriptors: Confidentiality, Data Collection, Ethics, Field Studies
Dinkins, Carol E. – 1984
In considering the purposes of the Freedom of Information Act (FOIA), it is essential to keep in mind that the Act is not, and never could be, a statute with the singleminded purpose of disclosing government information. Many kinds of information that the government has in its possession must be kept confidential to protect important public…
Descriptors: Disclosure, Federal Government, Federal Legislation, Freedom of Speech
Coggins, Patrick C.; And Others – 1979
This participant manual is designed to provide an overview of federal laws and regulations pertaining to the confidentiality of alcohol and drug abuse patient records. The relationship of federal laws to state laws and regulations is also discussed. The materials, useful for persons involved in the fields of substance abuse treatment or…
Descriptors: Alcoholism, Confidential Records, Confidentiality, Court Litigation
Glasser, Theodore L.; Jassem, Harvey C. – 1979
In the 1978 "FCC v. Pacifica Foundation" ruling, the United States Supreme Court considered the authority of the Federal Communications Commission (FCC) to regulate indecent radio programing, finding that the public has a constitutionally protected interest in being protected against objectionable programing. The FCC suit, arising out of…
Descriptors: Censorship, Communication (Thought Transfer), Court Litigation, Courts
Smith, Charles P.; And Others – 1980
One function of a Human Subjects Committee is to review the possible adverse effects of ethically problematic experiments. The concerns of an institutional review committee about the possible adverse effects of an ethically-problematic "cheating" study were examined with regard to the actual effects reported by the subjects. Retrospective…
Descriptors: Anxiety, Cheating, Confidentiality, Ethics
Chartrand, Robert L.; Emard, Jean Paul – 1979
The materials listed were selected to provide insights into the role of information systems and technology in present day American society. Emphasized throughout the bibliography are the issues of right to privacy, research and development reporting, information access and policy, and legislator reliance on information services. Citations are…
Descriptors: Administration, Bibliographies, Computer Oriented Programs, Computers
Westin, Alan F.; And Others – 1979
This report of a Louis Harris poll on national opinions toward privacy includes the questions asked of each respondent and the responses given in categories related to age, sex, employment, income, and other factors. There are chapters on privacy and the individual; personal privacy in relation to governmental and business institutions; privacy…
Descriptors: Computers, Futures (of Society), Government (Administrative Body), Industry
Peer reviewed Peer reviewed
Sandelands, Lloyd E.; Stablein, Ralph E. – Social Behavior and Personality, 1986
Investigated whether trait differences in self-consciousness would account for egocentric attribution bias in social interaction. Bias was greater for high public self-consciousness. Public self-consciousness had no effect in the Interaction Unimportant Condition where social interaction was not salient. Contrary to prediction, however, the…
Descriptors: Attribution Theory, Bias, College Students, Higher Education
Peer reviewed Peer reviewed
Knouse, Stephen B. – Bulletin of the Association for Business Communication, 1987
Examines the advantages and disadvantages of both the open and the confidential letter of recommendation and offers suggestions as to what kind of information should be included in such letters. (JC)
Descriptors: Business Correspondence, Confidentiality, Content Analysis, Employment Practices
Cleveland, Harlan – AGB Reports, 1985
The advantages and disadvantages of laws mandating openness in decision-making are outlined, and their particular relevance in the case of collegial decision-making is discussed. (MSE)
Descriptors: Communication (Thought Transfer), Decision Making, Democratic Values, Disclosure
Peer reviewed Peer reviewed
Greenawald, Dale; Clarke, Phyllis – Update on Law-Related Education, 1988
Presents a lesson plan for grades 4-6 which illustrates the concepts of privacy, property, and search and seizure. Calls upon students to recognize that individual property and society's need for security may conflict. Uses seven cases to help students learn and identify legal search and seizure procedures. (GEA)
Descriptors: Citizenship Education, Civil Liberties, Constitutional Law, Intermediate Grades
Splitt, David A. – Executive Educator, 1988
In an Oklahoma case, the district court ruled that the school district had failed to investigate the background of a teacher convicted of a second sexual abuse charge. School districts should examine personnel polices and practices, and the school lawyer should review state laws, regulations, and court cases. (MLF)
Descriptors: Background, Court Litigation, Elementary Secondary Education, Employment Practices
Peer reviewed Peer reviewed
Bearman, Toni Carbo; And Others – Library Trends, 1986
In the first of three articles, Bearman discusses trends, policy issues, and implications of policy developments for the library and information community. Jacob and Rings discuss copyright law, regulations, culture, language, recent technological developments, economic aspects, and privacy legislation. Burger provides background on evaluating…
Descriptors: Copyrights, Cultural Differences, Developed Nations, Developing Nations
Philips, Stephen P.; Summers, Joseph V. – American School Board Journal, 1987
Discusses a "silent menace" in school computer rooms--the potential misuse of databases containing student directories, teacher salary information, test scores, and other data. Describes administrative computer uses and possible abuses, including invasion of privacy, false correlations between data sets, and manipulation of data for questionable…
Descriptors: Achievement Tests, Boards of Education, Computer Uses in Education, Data Interpretation
Pages: 1  |  ...  |  186  |  187  |  188  |  189  |  190  |  191  |  192  |  193  |  194  |  ...  |  226