Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yen, Cherng-Jyh – Quarterly Review of Distance Education, 2008
The purpose of this study was to conduct a confirmatory factor analysis of the Computer-Mediated Communication Questionnaire scores, using structural equation modeling, to assess the consistency between the empirical data and the hypothesized factor structure of the CMCQ in the proposed models, which is stipulated by the theoretical framework and…
Descriptors: Computer Mediated Communication, Questionnaires, Validity, Factor Analysis
De Souza, Zaineb; Dick, Geoffrey N. – Pastoral Care in Education, 2008
This paper reports the results of the first academic study of the use of a major social networking website, MySpace, by children. The study examined the degree of, and reasons for, information disclosure by children in high schools in Sydney, Australia. Social networking sites such as MySpace are a huge Internet phenomenon, some with hundreds of…
Descriptors: Privacy, Foreign Countries, Internet, Web Sites
Sharma, Priya; Xie, Ying – Journal of Asynchronous Learning Networks, 2008
Recently, attempts have been made to use Weblogs and other personal webpublishing technologies to support individual and social reflection in higher education. Weblogs can be highly individual and reflective in nature, and students' experiences and perceptions of the technology and practice are of primary importance in furthering educational use.…
Descriptors: Student Attitudes, Data Analysis, Electronic Publishing, Web Sites
McClanahan, Kitty – Bulletin of Science, Technology & Society, 2008
Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…
Descriptors: Medical Services, Medical Education, Privacy, Confidential Records
Weinberger, JoAnn – 1981
Since 1972, the issue of human rights protection has grown in complexity and intensity. Congress has passed four laws: Family Educational Rights and Privacy Act of 1974; Freedom of Information Act, as amended; Privacy Act of 1974; and National Research Act of 1974. From 1971-1980, the Department of Health, Education and Welfare (DHEW) and then the…
Descriptors: Federal Legislation, Federal Regulation, Privacy, Research Problems
Peer reviewedBeiswinger, George L. – Family Coordinator, 1979
The anatomy of a recent High Court case reveals how a potpourri of legal input and reasoning resulted in a decision that could strike a blow for both understanding and positive action in the emotionally-laden, controversial area of teenage sexuality. (Author)
Descriptors: Adolescents, Court Litigation, Privacy, Sex Education
Rice, John D. – Personnel Administrator, 1978
By considering current practices in light of existing and expected laws, this article develops some generally applicable guidelines for both requesters and providers of employment reference information. (Author/IRT)
Descriptors: Administrators, Federal Legislation, Guidelines, Personnel Data
Peer reviewedSimpson, Evan – Educational Theory, 1986
This article reviews values clarification theory and goes beyond its explicit doctrines to discuss shortcomings. (MT)
Descriptors: Goal Orientation, Moral Development, Privacy, Values Clarification
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy
Shachtman, Tom – Media and Methods, 1977
Reflects on the exploitation of documentary film subjects--the dangers it poses as well as the responsibilities it presents. (Author/KS)
Descriptors: Documentaries, Ethics, Films, Privacy
Conable, Gordon – American Libraries, 1990
Discusses investigation of librarians by the FBI (Federal Bureau of Investigation) and the status of the Library Awareness Program. An American Library Association (ALA) resolution opposing FBI activities in libraries and demanding release of individual files to persons subjected to checks is described. A model letter for individuals to use in…
Descriptors: Freedom of Information, Librarians, Library Associations, Privacy
Kennedy, Mike – American School & University, 2000
Discusses the integration of the school intercom system with phones in the classroom to enhance main office to classroom communication with an element of privacy. The contribution of classroom phones to safety and security issues is highlighted. (GR)
Descriptors: Communications, Elementary Secondary Education, Privacy, Public Schools
Markell, Ginny – Our Children, 2000
Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…
Descriptors: Elementary Secondary Education, Internet, Parent Responsibility, Privacy
Peer reviewedExtejt, Marian M. – Business Communication Quarterly, 1998
Discusses current standards for formatting and etiquette of electronic mail in the business setting. Discusses privacy and appropriate content. Notes that class assignments involving electronic mail provide practical opportunities to develop ease with this form. (SR)
Descriptors: Business Communication, Electronic Mail, Higher Education, Privacy
Peer reviewedDe Maeyer, Dirk – Internet Research, 1997
Examines the Internet's potential for becoming an information highway. Highlights include definitions of the information highway and the Internet; the infrastructure of an information highway; capacity; connectivity; simultaneity; network protocols; applications; interactivity; openness; mobility and remote access; universal access; affordable…
Descriptors: Access to Information, Computer Security, Internet, Privacy

Direct link
