Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedMelton, Gary B. – American Psychologist, 1991
The overriding concern in the UN Convention on the Rights of the Child is dignity. The implications for mental health policy are discussed. The U.S. may not ratify the convention, but it should serve as a guide for state lawmakers and mental health professionals involved in children's issues. (DM)
Descriptors: Children, Human Dignity, Laws, Mental Health
Peer reviewedJones, Mary Gardiner; Nelson, Helen Ewing – Advancing the Consumer Interest, 1991
New technologies such as audiotex and videotex raise public policy issues related to access, use of a common carrier network, basic versus enhanced services, financing the system, government responsibility, the Bell companies as providers, consumer protection, and privacy. (SK)
Descriptors: Access to Information, Consumer Education, Consumer Protection, Government Role
Larson, Edward J. – National Forum: Phi Kappa Phi Journal, 1993
Two ethical concerns about the Human Genome Project, which aims to sequence all the DNA of a human cell, are discussed: (1) use of germ-line gene therapy to treat perceived hereditary defects or enhance supposed genetic attributes, and (2) personal privacy and potential discrimination arising from possession of individual genetic information. (MSE)
Descriptors: Confidential Records, Ethics, Genetic Engineering, Higher Education
Marcinko, Randall – Searcher, 1998
Describes listservs as communities of individuals who come together on the Internet based on a common interest. Highlights include types of listservs, including those based on specific subjects, supporting products, goal-oriented, disseminating information, and friendship; e-mail filters; lists in the information industry; content quality; privacy…
Descriptors: Computer Mediated Communication, Content Analysis, Electronic Mail, Information Dissemination
Plopper, Bruce – Communication: Journalism Education Today, 1998
Notes that journalists have to balance their desire to print the news with personal rights to privacy. Argues that a working knowledge of ethics and law helps journalism students resolve such issues. Discusses ethical issues; legal aspects of privacy; and "training" administrators. Offers a list of questions to ask, six notable court…
Descriptors: Court Litigation, Ethics, Journalism Education, News Reporting
Peer reviewedWengert, Robert G. – Library Trends, 2001
Questions whether a focus on ethics and rights leads to a narrow idea of the library profession and its clients, using issues of censorship as examples. Highlights include a proposed definition of information; information flow; privacy; ethical debates and consequences for libraries; and the American Library Association Code of Ethics. (Author/LRW)
Descriptors: Censorship, Civil Liberties, Codes of Ethics, Ethics
Johnston, Scott D. – Proceedings of the ASIS Annual Meeting, 2000
Examines the role of self-regulation in the establishment of an informational privacy policy. Discusses information technologies and changes in commerce; personal information in databases; demands for accountability; institutional and enforcement models; legislation; government failures; self-regulation and the individual; and potential problems…
Descriptors: Accountability, Databases, Government Role, Information Policy
Wood, Heather – School Planning & Management, 2002
Describes how barracks renovations at West Point have included the replacement of privacy partitions and screens in restrooms and locker rooms with items of high-density polyethylene (HDPE), which is more durable than metal. (EV)
Descriptors: College Buildings, Educational Facilities Improvement, Higher Education, Locker Rooms
Gorman, Michael – Library Journal, 2001
Discusses information overload and society's and libraries' responses to technology. Considers eight values that libraries should focus on and how they relate to technology in libraries: democracy, stewardship, service, intellectual freedom, privacy, rationalism, equity of access, and building harmony and balance. (LRW)
Descriptors: Access to Information, Democracy, Intellectual Freedom, Library Automation
Balas, Janet L. – Computers in Libraries, 2001
Discusses privacy issues related to electronic libraries. Highlights include finding guidance and information on the Web, including the American Library Association, Center for Democracy and Technology, and the Electronic Privacy Information Center; legal responsibilities in maintaining privacy rights of patrons who access the Internet; and…
Descriptors: Electronic Libraries, Internet, Legal Responsibility, Library Policy
Peer reviewedConnerley, Mary L.; Mael, Fred A. – Journal of Management Education, 2001
In Study 1, 439 students identified individual attributes that contributed to team performance. In Study 2, 287 students rated attributes desirable and necessary to know about team members as well as their invasiveness. The more invasive items were also considered the most necessary to know about prospective team members. (Contains 51 references.)…
Descriptors: Business Administration Education, College Students, Group Dynamics, Higher Education
Peer reviewedKhosrow-Pour, Mehdi; Herman, Nancy – Electronic Library, 2001
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
Descriptors: Computer Security, Delphi Technique, Electronic Mail, International Law
Schmidt, Peter – Chronicle of Higher Education, 2001
Discusses how public colleges are increasingly clashing with the news media over compliance with state sunshine laws, particularly regarding searches for new presidents. Experts attribute the trend to increased competitiveness among institutions and a shift in public attitudes away from suspicion of government and toward privacy concerns. (EV)
Descriptors: Disclosure, Freedom of Information, Higher Education, Information Dissemination
Peer reviewedAlbert, Steven M.; Levine, Carol – Gerontologist, 2005
Research in family caregiving recently has become more challenging because of the strict protection of privacy mandated in the Health Insurance Portability and Accountability Act (HIPAA) of 1996. We ask when should Institutional Review Boards (IRBs) follow HIPAA rules to the letter and when might they use the waiver option? What is the appropriate…
Descriptors: Patients, Caregivers, Privacy, Health Insurance
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security

Direct link
