NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,926 to 2,940 of 3,396 results Save | Export
O'Reilly, James T.; Simon, Gale P. – 1980
In recent years a surge of conflicting laws and regulations have emanated from Congress, federal agencies, and the courts concerning the right of individuals and organizations to obtain what heretofore had been considered private information and the right of individuals and organizations to maintain the privacy of such information. To answer the…
Descriptors: Collective Bargaining, Compliance (Legal), Confidential Records, Court Litigation
Wachowiak, Dale G.; Barret, Robert L. – 1980
One- and two-career married couples, though existing on comparable total family incomes, may be experiencing very different marital situations. The marital agreements of one- and two-career couples were compared to examine the relationship between marital adjustment and the one- versus two-career situation. Married college students and their…
Descriptors: Adjustment (to Environment), Employed Women, Family Life, Home Management
Huttenstine, Marian L. – 1979
A number of court cases involving public disclosure of private information are described in this paper to point to historical trends involving the issue of privacy and to illustrate some of the problems with all aspects of the issue. After noting the conflict between the principle of individual privacy and the principle of free disclosure of…
Descriptors: Civil Liberties, Court Litigation, Disclosure, Freedom of Speech
Peer reviewed Peer reviewed
Wegner, John M. – Journal of Broadcasting and Electronic Media, 1985
Examines potential threats to privacy posed by development of unified interaction systems in the home. Applicability of existing federal laws, constitutional provisions, and regulatory actions, and the possible technical and legislative actions that may be useful in curtailing possible privacy abuses in these systems are analyzed. (Author/MBR)
Descriptors: Alarm Systems, Communications, Constitutional Law, Court Litigation
Peer reviewed Peer reviewed
Keller, Elisabeth A. – Journal of College and University Law, 1988
The right to form adult consensual intimate relationships is a fundamental personal freedom. A strong and effective university policy against sexual harassment and the recognition of faculty and students' right to privacy will, within the parameters of constitutional guarantees, serve both the university's and the individual's interest.…
Descriptors: Constitutional Law, Court Litigation, Ethics, Higher Education
Peer reviewed Peer reviewed
Cunningham, Maureen P.; And Others – Journal of College and University Law, 1988
A case in which California's constitutional right to privacy is used to protect confidential peer review files is analyzed, and the case's significance and possible ramifications for discovery requests of peer review files are discussed. (MSE)
Descriptors: Academic Freedom, College Faculty, Confidentiality, Constitutional Law
Peer reviewed Peer reviewed
Kerr, Stephen T. – Machine-Mediated Learning, 1985
Describes videotex development; discusses optimal internal organization, visual display, and presentation of information on videotex screen; addresses policy issues of equity, privacy, and costs that affect instructional use of videotex; outlines videotex field trials and experiments within education; and draws conclusions on significance of…
Descriptors: Color, Computer Graphics, Costs, Databases
Peer reviewed Peer reviewed
Mingle, James R. – Journal of College and University Law, 1986
Harlan Cleveland's book concerning the benefits and costs of open governing board meetings is reviewed and critiqued, especially in its suggestions for modification of statutes in the cases of presidential searches and program and board evaluations. (MSE)
Descriptors: Accountability, Administrator Selection, Agency Role, Book Reviews
Peer reviewed Peer reviewed
Troutner, Joanne – Journal of Computers in Mathematics and Science Teaching, 1986
Suggests learning activities for teaching computer ethics in three areas: (1) equal access; (2) computer crime; and (3) privacy. Topics include computer time, advertising, class enrollments, copyright law, sabotage ("worms"), the Privacy Act of 1974 and the Freedom of Information Act of 1966. (JM)
Descriptors: Computer Literacy, Computers, Crime, Equal Facilities
Peer reviewed Peer reviewed
Liew, Chong K.; And Others – Journal of the American Society for Information Science, 1985
Introduces two data distortion methods (Frequency-Imposed Distortion, Frequency-Imposed Probability Distortion) and uses a Monte Carlo study to compare their performance with that of other distortion methods (Point Distortion, Probability Distortion). Indications that data generated by these two methods produce accurate statistics and protect…
Descriptors: College Faculty, Comparative Analysis, Data Processing, Monte Carlo Methods
Peer reviewed Peer reviewed
Dellinger, Anne M. – School Law Bulletin, 1983
Focusing on the difficult privacy issues inherent in school health problems, this article offers a legal background to the counseling and record keeping responsibilities facing school personnel dealing with the prevalent and potentially stigmatizing student health problems of pregnancy, substance abuse, and sexually transmitted diseases. (MJL)
Descriptors: Drug Abuse, Elementary Secondary Education, Legal Problems, Pregnant Students
Peer reviewed Peer reviewed
Curtin, Constance; Shinall, Stanley – CALICO Journal, 1984
A computer-assisted university foreign language project using individualization is described. Its advantages include improved student attitudes and learning efficiency, active practice, student privacy, and increased opportunities for teacher innovation and learning. (MSE)
Descriptors: College Second Language Programs, Computer Assisted Instruction, Efficiency, Higher Education
Stelly, Philip – American School Board Journal, 1984
Discusses legal problems of a policy permitting the use of metal detectors to search students suspected of carrying concealed weapons. A wholesale search policy was challenged as a violation of students' rights, so the board adopted a selective search policy based on reasonable suspicion. (TE)
Descriptors: Board of Education Policy, Crime Prevention, Elementary Secondary Education, Legal Problems
Elliott, Delbert S.; Grady, Jane M.; Heys, Landa; Ntepp, Rhonda; Williams, Susan – Center for the Study and Prevention of Violence, 2002
Nationwide, schools, communities, parents and students recognize the continuing need to make schools a safe place, an environment where children can learn without fear for their safety. In the past few years, the available research on violence prevention has increased, providing legislators with important information about effective violence…
Descriptors: School Safety, Planning, Violence, Prevention
Cheskis-Gold, Rena; Loescher, Ruth; Shepard-Rabadam, Elizabeth; Carroll, Barbara – Online Submission, 2004
This paper provides an overview of the entire process necessary to developing a university-wide web survey, from the community-building process for creating support for the survey and determining the questions, to the specific tasks necessary for designing and administering an efficient web product. (Contains 17 tables.)
Descriptors: Institutional Research, Higher Education, Surveys, Computer Assisted Testing
Pages: 1  |  ...  |  192  |  193  |  194  |  195  |  196  |  197  |  198  |  199  |  200  |  ...  |  227