Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography
Denning, Dorothy E., Ed.; Lin, Herbert S., Ed. – 1994
This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services,…
Descriptors: Access to Information, Censorship, Computer Networks, Confidentiality
Garson, G. David – 1995
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Descriptors: Case Studies, Civil Liberties, Computer Security, Computers
Sivin, Jay P.; Bialo, Ellen R. – 1992
In response to the rapid growth of computer crime and such illegitimate practices as piracy and fraud, the National Institute of Justice and the Office for Educational Research and Improvement have formed a partnership to promote school programs on the ethical uses of new technologies. This report, the first of the partnership, is designed to…
Descriptors: Computer Software, Curriculum Development, Educational Technology, Electronic Mail
Shrader, Erwin – 1983
Of major concern to United States position and policy in the telecommunications and information areas is "transborder data flow," the transferring of computer stored data between nations. Many European nations, including France, Austria, and West Germany, have enacted laws regulating the flow of information leaving the country where it…
Descriptors: Business, Communication (Thought Transfer), Computers, Databases
Congress of the U.S., Washington, DC. House Committee on the Judiciary. – 1989
Focusing on the Library Awareness Program, these two congressional hearings scrutinize the efforts of the Federal Bureau of Investigation (FBI) to collect counterintelligence data from librarians regarding their patrons. Two examples of proposed legislation to address the question of intellectual privacy and confidentiality are included. Testimony…
Descriptors: Ethics, Hearings, Intellectual Freedom, Librarians
Trubow, George – 1989
In this policy briefing, the technological developments of recent years are linked to the erosion of individuals' informational privacy under the press of bureaucratic efficiency and the ever-growing needs of executive agencies for more information. It is noted that privacy protection within federal agencies may entail costs, and therefore, may be…
Descriptors: Access to Information, Agency Role, Disclosure, Foreign Countries
Porter, Dennis – 1990
One recommendation of the 1989 California Strategic Plan for Adult Education is the use of EduCard. EduCard, the Adult Education Access Card, is a means of giving learners access to information about educational opportunities and providing administrators with machine-readable information on learners' prior education and traiing. Three models are:…
Descriptors: Access to Education, Adult Education, Confidential Records, Databases
Fulwiler, Toby – 1987
Intended to help teachers avoid the problems of privacy posed by asking students to keep journals or personal notebooks, this starter sheet outlines some of the assumptions behind journal assignments and suggests guidelines for assigning journals. The first section presents a list of assumptions about the connections between thought and language…
Descriptors: Controversial Issues (Course Content), Elementary Secondary Education, Guidelines, Higher Education
American Council on Education, Washington, DC. – 1983
Guidelines for colleges concerning the privacy of employee records are presented in two policy statements. Institutional policy should minimize intrusiveness, maximize fairness, and create legitimate expectations of confidentiality. In addition to strengthening professional equity of treatment, confidentiality permits consideration of both adverse…
Descriptors: Administrative Policy, College Administration, College Faculty, Confidential Records
Tolman, Richard R.; And Others – 1983
This module is part of an interdisciplinary program designed to educate the general citizenry regarding the issues of science/technology/society that have important consequences for both present and future social policies. Specifically, the program provides an opportunity for students to assess the effects of selected technological innovations in…
Descriptors: College Science, Computers, Confidential Records, High Schools
Beckett, Ernest; Miller, Mary Bruce – 1983
Course outlines, evaluation instruments, and background information to help teachers implement two legal education courses, one for junior and one for senior high school, are provided. The junior high course, "Youth and the Law," introduces basic legal terminology and criminal and civil processes, giving special attention to the concepts…
Descriptors: Citizenship Education, Concept Teaching, Criminal Law, Delinquency
International Federation of Library Associations, The Hague (Netherlands). – 1985
Papers on international access to information pertaining to legal research, which were presented at the 1985 conference of the International Federation of Library Associations (IFLA) include: (1) "Materials of European Intergovernmental Organizations and Their Accessibility through Available Research Tools" (Irene Berkey, Northwestern…
Descriptors: Computers, Foreign Countries, Global Approach, International Cooperation
Starr, Isidore – 1981
Law has been neglected as an area of inquiry in citizenship education. Fundamental to citizenship education is the teaching of the Constitution of the United States and the Bill of Rights in elementary and secondary schools. The bicentennials of these documents will be celebrated within the next decade. Law-related inquiry could enrich the…
Descriptors: Behavior Patterns, Citizenship Education, Civil Rights, Compliance (Legal)
American Psychological Association, Washington, DC. Clearinghouse on Precollege Psychology. – 1979
Approved by the American Psychological Association (APA), these guidelines are designed to help high school psychology teachers make decisions relating to ethical problems in their classrooms. The guidelines cover three areas: the use of animals in school science behavior projects, the use of human participants in research or demonstrations…
Descriptors: Codes of Ethics, Confidentiality, Educational Problems, Guidelines


