Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedFielding, Derek – Australian Library Journal, 1978
A comparison of current civil liberties issues in Australia with the status of similar issues in Britain and the United States. Included are political affiliation of government employees, censorship, rights of the individual, privacy, and freedom of information. (JAB)
Descriptors: Censorship, Civil Liberties, Librarians, Participation
Lunin, Lois F. – Bulletin of the American Society for Information Science, 1978
Some aspects of the non-profit Copyright Clearance Center (CCC), a centralized system through which users receive permission to do authorized photocopying of periodical articles, are described including the confidentiality provided to authors, publishers, and users, and funding. (Author/MRB)
Descriptors: Copyrights, Financial Support, Periodicals, Privacy
Adams, Julian – Communication: Journalism Education Today (C:JET), 1984
Discusses the criteria of "newsworthy" regarding news reporting and the right to privacy. Examines the thin line between what is legal and what is ethical to print and some components of the law to consider when making such decisions. (HTH)
Descriptors: Court Litigation, Disclosure, Ethics, Journalism
Peer reviewedLetwin, Alita Z. – Update on Law-Related Education, 1982
Describes six activities from Law in a Free Society (LFS) materials designed to help elementary and secondary students examine a variety of privacy issues. Students read literature, a news release, or another type of written material and answer questions. A list of enrichment activities is also included. (AM)
Descriptors: Class Activities, Elementary Secondary Education, Legal Education, Privacy
Peer reviewedKinkus, Jane F. – Issues in Science & Technology Librarianship, 2002
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
Descriptors: Children, Computer Security, Confidentiality, Cryptography
Descy, Don E. – Educational Technology, 1997
Most users have misconceptions about how the Internet works. Provides a brief history of the Internet and Transmission Control Protocol/Internet Protocol (TCP/IP); discusses electronic mail, privacy, and voluntary and involuntary information gathering; and contrasts the Internet and libraries, focusing on the Internet's lack of consistent…
Descriptors: Cataloging, Education, Electronic Mail, Internet
Albanese, Andrew Richard – Library Journal, 2002
Discusses copyright issues of interest to librarians with Lawrence Lessig, a legal scholar on copyright, technology, and the Constitution. Topics include Eldred v. Ashcroft; copyright extensions; balancing interests of copyright owners with future creators and the public; privacy, fair use, and public domain; and the Digital Millennium Copyright…
Descriptors: Copyrights, Court Litigation, Fair Use (Copyrights), Libraries
Zirkel, Perry A. – Principal, 2003
Discusses 2002 U.S. Supreme Court's unanimous opinion in "Owasso Independent School District" (Oklahoma) holding that peer grading does not violate the Family Education Rights and Privacy Act (FERPA). (PKP)
Descriptors: Court Litigation, Elementary Secondary Education, Privacy, Student Rights
Wand, Sean; Thermos, Adam C. – American School & University, 1998
Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)
Descriptors: Electronic Equipment, Higher Education, Privacy, Purchasing
Peer reviewedHolt, Margaret E. – New Directions for Adult and Continuing Education, 1998
Power, access, control, privacy, and equity are some of the ethical concerns involved in teaching and learning on the Internet. The potential for harm cannot be ignored or underestimated. (Author/SK)
Descriptors: Access to Education, Adult Education, Ethics, Internet
Coyle, Karen – Library Journal, 2001
Discusses privacy issues related to use of the Internet. Topics include data gathering functions that are built into applications of the World Wide Web; cookies that identify Web site visitors; personal identity information; libraries and privacy, including the need for privacy policies; protecting your privacy; and developing privacy literacy.…
Descriptors: Data Collection, Internet, Library Policy, Policy Formation
Peer reviewedGeorge, Joey F. – Internet Research, 2002
Using the theory of planned behavior as the theoretical base, data collected through a semi-annual survey of Web users were used to determine if beliefs about privacy and Internet trustworthiness helped determine attitudes toward the Internet, which were thought to affect intent to make Internet purchases. (Author/LRW)
Descriptors: Attitudes, Decision Making, Intention, Internet
Peer reviewedMcIntyre, Tom; Tong, Virginia M.; Perez, Joseph F. – Journal of Correctional Education, 2001
Outlines concerns about Internet use by incarcerated youth such as use of e-mail for criminal activity and privacy and censorship of online communications. Gives guidelines for Internet use that would address concerns while giving these youth access to the educational advantages of the technology. (SK)
Descriptors: Adolescents, Computers, Correctional Education, Internet
Maxwell, Lesli A. – Education Week, 2006
This article discusses a new state law which has stirred up a fierce dispute over privacy rights, as innocent school employees in Michigan have begun learning that they have been misidentified as criminals. The Student Safety Initiative, a series of laws that took effect January 1, required Michigan school districts to obtain criminal-background…
Descriptors: State Legislation, Privacy, School Law, School Personnel
Williams, Tracy – CUPA-HR Journal, 2003
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Descriptors: Human Resources, Colleges, Computer Security, Privacy

Direct link
