Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedDeal, Walter F., III – Technology Teacher, 2004
Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna…
Descriptors: Identification, Telecommunications, Technological Advancement, Privacy
McCarthy, Martha M. – Educational Horizons, 2004
Accompanying the explosive growth of the Internet have been concerns about protecting children from viewing pornographic and other harmful images through cyberspace. In the past few years, Congress has passed several acts to censor Internet sites available to children, but only the Children's Internet Protection Act (CIPA) has received Supreme…
Descriptors: Libraries, Internet, Federal Legislation, Pornography
Moriya, Dafna – Art Therapy: Journal of the American Art Therapy Association, 2006
School art therapists face numerous ethical dilemmas, from referrals to therapy, through privacy, safety and predictability in the art therapy room, to the need to balance cooperation with the educational staff and its expectations of shared information with loyalty to the patient. Breach of confidentiality also has legal implications. The…
Descriptors: Confidentiality, Art Therapy, Ethics, Privacy
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Kranich, Nancy – Knowledge Quest, 2007
Teenagers will freely give up personal information to join social networks on the Internet. However, a 2007 study by the Pew Internet and American Life project found that most of the 55 percent of teens who place their personal profiles online take steps to protect themselves from the most obvious areas of risk. Parents, teachers, and librarians…
Descriptors: Risk, Social Networks, Internet, Librarians
Rasmussen, Chris; Johnson, Gina – Midwestern Higher Education Compact, 2008
This report is the result of a nationwide survey conducted in March 2008 of student life officers and campus safety directors to assess the impact of the April 2007 shootings at Virginia Tech on campus safety and security policy and practice. Discussion areas include: (1) Student Privacy vs. Need-to-Know; (2) Prevention, Mitigation and Recovery;…
Descriptors: Tragedy, Campuses, Student Behavior, Mental Disorders
McKee, Heidi; Porter, James E. – College Composition and Communication, 2008
The study of writers and writing in digital environments raises distinct and complex ethical issues for researchers. Rhetoric theory and casuistic ethics, working in tandem, provide a theoretical framework for addressing such issues. A casuistic heuristic grounded in rhetorical principles can help digital writing researchers critically…
Descriptors: Writing (Composition), Computer Mediated Communication, Electronic Publishing, Computer Uses in Education
Arntfield, Mike – Bulletin of Science, Technology & Society, 2008
This article interrogates the relationship between technology and law enforcement and how changing police surveillance techniques have influenced Western expectations of privacy from the mid-19th century to the present. By examining the evolution of telecommunications devices in particular, the author identifies a diffuse and publicly inclusive…
Descriptors: Privacy, Law Enforcement, Telecommunications, Foreign Countries
Congress of the U.S., Washington, DC. Senate Committee on Governmental Affairs. – 1986
Submitted to Congress by Senator William V. Roth, Jr., of the Committee on Governmental Affairs, this document reports favorably on Senate Bill 786 (the Information Age Commission Act of 1986), legislation designed to establish a commission to study the impact of computer and communications systems on American society. The report provides: (1) a…
Descriptors: Communications, Computers, Costs, Federal Legislation
Larson, Jeffry H.; Bell, Nancy J. – 1983
Little is known about the implications of individual differences in privacy preferences. To explore the relationship between privacy preferences and the style and quality of social interaction in a first encounter, 77 of 320 college students completing the Privacy Preference Scale were grouped according to their low (20 male, 20 female) or high…
Descriptors: College Students, Higher Education, Individual Differences, Interaction
Werner, Carol; Haggard, Lois – 1984
The findings from a study of 42 administrators in a large metropolitan school district supported the hypothesis that the use of privacy regulation mechanisms is deliberate and dynamic. The researchers considered the age and sex of the administrators, the length of time they'd held their current jobs, their tendencies toward Type A or Type B…
Descriptors: Administrator Characteristics, Administrators, Coping, Hypertension
Peer reviewedMarshall, Nancy J. – Multivariate Behavioral Research, 1974
The development of the Privacy Preference Scale is described. Six subscales were constructed from a principal axis factor analysis. The ability of the subscales to differentiate between age and sex groups, and their relationship to personality measures and to self-reported privacy oriented behavior are presented. (Author/RC)
Descriptors: Adults, Age Differences, Factor Analysis, Personality Measures
Federal Register, 1976
This document provides the public with a single document containing all regulatory provisions pertaining to the Family Educational Rights and Privacy Act. Included is a summary of the major comments received after publication of a notice of proposed rule-making. Each summary of comments is followed by a response that indicates whether or not a…
Descriptors: Elementary Secondary Education, Federal Legislation, Higher Education, Parents
Riley, Sam G.; Shandle, Jack – 1974
The question of whether protection against unauthorized use of a person's name of likeness for commercial gain is subsumed under property rights or the right to privacy remains unsettled. The thesis of this article is that either area may be appropriate, depending on the plaintiff's motivation in bringing the action. The case of Lugosi v.…
Descriptors: Business, Civil Liberties, Court Litigation, Equal Protection
Peer reviewedMadsen, Rex E. – Utah Law Review, 1975
The Tenth Circuit Court affirmed that the University of New Mexico must comply with an Equal Employment Opportunity (EEOC) subpoena for personnel records. The author concludes after examining the case that the court's decision will probably not have an enduring effect in defining employee privacy interests and EEOC access to records. (JT)
Descriptors: Confidential Records, Constitutional Law, Court Litigation, Higher Education

Direct link
