NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,581 to 2,595 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Ladany, Nicholas; And Others – Journal of Counseling Psychology, 1996
Nondisclosures in supervision were studied for 108 supervisees. Supervisees reported an average of 8.06 nondisclosures ranging in importance level. Negative reactions to the supervisor were the most frequent type of nondisclosure. The most frequent reasons for nondisclosures were perceived unimportance, that the nondisclosure was too personal,…
Descriptors: Adults, Communication (Thought Transfer), Counselor Educators, Counselor Training
Peer reviewed Peer reviewed
Direct linkDirect link
Basham, Matt – Community College Journal, 2003
Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…
Descriptors: Civil Liberties, Community Colleges, Computer Security, Computers
Peer reviewed Peer reviewed
Friedman, Stephen J. – Clearing House, 2002
Shares the history of a court case in which students are required to announce grades aloud. Suggests that a professional responsibility of teachers is to build trust between those who hold power and those who do not. Contends that peer grading can serve other roles, such as an opportunity where students can feel comfortable learning from their…
Descriptors: Classroom Environment, Court Litigation, Elementary Education, Grading
Peer reviewed Peer reviewed
D'Emilio, John – Academe, 1990
If one's reference point is university life a generation ago, one can say that things are getting better for gay faculty, students, administrators, and staff. College administrators need to take an activist stance to counteract misinformation about gays and cultural prejudices, and the growing problem of hate-motivated incidents. (MLW)
Descriptors: Civil Liberties, Feminism, Higher Education, Homosexuality
Rotenberg, Marc – EDUCOM Review, 1994
Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)
Descriptors: Computer Networks, Confidential Records, Educational Needs, Federal Legislation
Trotter, Andrew – Executive Educator, 1995
Every year, a few administrators mishandle school searches and create spectacles similar to the New Castle, Pennsylvania, incident involving six illegally strip-searched students. Principals using "cops-and-robber" techniques to unearth contraband may not realize the potential for infringing on students' constitutional privacy rights.…
Descriptors: Administrator Responsibility, Court Litigation, Legal Problems, Principals
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime
Peer reviewed Peer reviewed
Sanchez, J. M. – Journal of Law and Education, 1992
Reviews 18 criminal cases decided by state appellate courts that have applied standards set forth by U.S. Supreme Court in "New Jersey v. T.L.O" which defined extent to which public school officials could constitutionally search students and their property. Contends Supreme Court made it possible for state courts to practically expunge…
Descriptors: Court Litigation, Elementary Secondary Education, Federal Courts, Privacy
Hill, Julia M. – Electronic Networking: Research, Applications and Policy, 1992
The X.500 Directory Service provides a mechanism for finding information about people, organizations, services, network hardware, and more in the global network environment. Issues involved in X.500 participation by an organization include management support, data gathering, rights and concerns of individuals, access control, privacy, accuracy,…
Descriptors: Access to Information, Computer Networks, Directories, Electronic Mail
Peer reviewed Peer reviewed
Griffith, Jane Bortnick; Smith, Marcia S. – Journal of Academic Librarianship, 1994
Discusses issues connected with the information superhighway and the National Information Infrastructure (NII). Topics addressed include principles for government action; economic benefits; regulations; applications; information policy; pending federal legislation; private sector/government relationship; open access and universal service; privacy…
Descriptors: Access to Information, Economic Factors, Federal Legislation, Federal Regulation
Peer reviewed Peer reviewed
Rapaport, Edmund; Samuelson, Per – Government Publications Review, 1991
Discusses record keeping and the preservation of archival materials for research purposes in Sweden. Concerns of privacy and confidentiality are addressed, the Swedish principle of access to public materials is described, the use of archival material for statistical research is discussed, and methods for balancing privacy and record keeping are…
Descriptors: Access to Information, Archives, Confidential Records, Foreign Countries
Peer reviewed Peer reviewed
Hartshorne, Timothy S.; Boomer, Lyman W. – Teaching Exceptional Children, 1993
Issues in the disclosure of special education student records and invasion of privacy are discussed. The article reviews what information teachers must disclose and may disclose, what information must be safeguarded, who has access to confidential information, what record of access must be maintained, and what information is not subject to…
Descriptors: Confidential Records, Disabilities, Disclosure, Elementary Secondary Education
Peer reviewed Peer reviewed
Weiler, Kay; Helms, Lelia B. – Journal of Professional Nursing, 1993
The academic dismissal of a nursing student for obesity raises questions about the basis for determining compliance with performance contracts and faculty responsibility for protecting student privacy. The case demonstrates the importance of clearly defined expectations and the need to respect privacy concerns. (SK)
Descriptors: Court Litigation, Expulsion, Higher Education, Nursing Education
Peer reviewed Peer reviewed
Readdick, Christine A. – Young Children, 1993
Children need privacy for learning autonomy, negotiation of space, creation, observation, and self-evaluation. Children achieve privacy by territoriality, verbal and nonverbal behavior, aggression, and withdrawal. Adults can help children meet privacy needs by providing a manipulable environment and schedule that balance solitude and interaction…
Descriptors: Aggression, Childhood Needs, Classroom Environment, Early Childhood Education
Pages: 1  |  ...  |  169  |  170  |  171  |  172  |  173  |  174  |  175  |  176  |  177  |  ...  |  227