Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Woodward, Belle; Martin, Nancy; Imboden, Thomas – Information Systems Education Journal, 2011
In recent years, ethics has drawn increased interest from information technology and computer science practitioners as well as from academicians. This article investigates the issues outlined in the PAPA framework in today's environment and explores the possibility that new issues have emerged. Findings indicate that the ethicality of property…
Descriptors: Ethics, Models, Information Technology, Student Surveys
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Ahluwalia, Madhu V. – ProQuest LLC, 2011
In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…
Descriptors: Databases, Information Security, Data, Information Retrieval
Adams, Helen R. – School Library Journal, 2011
Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…
Descriptors: Privacy, Student Rights, Student Records, School Libraries
Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie – Learning and Instruction, 2011
The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…
Descriptors: Voting, Debate, Classroom Environment, Computer Networks
Austin, Lisa M. – Bulletin of Science, Technology & Society, 2010
Contemporary privacy debates regarding new technologies often define privacy in terms of control over personal information such that the privacy "problem" is a lack of control and the privacy "solution" is increased control. This article questions the control-paradigm by pointing to its parallels with earlier debates in the…
Descriptors: Information Technology, Privacy, Legal Responsibility, Social Networks
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal – Information Systems Education Journal, 2012
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
Descriptors: Social Networks, Privacy, Information Security, Student Attitudes
Rogers, Sheryl D. – ProQuest LLC, 2012
The study was a policy analysis of student records policies within Florida public K-12 school districts. The researcher gathered all student records policies for the sixty-seven school districts. In addition, traditional legal research was used involving applicable federal acts, state statutes, case law, as well as legal and educational…
Descriptors: Public Schools, School Policy, Privacy, Policy Analysis
Greer, Christine Glah – ProQuest LLC, 2012
This study focuses on the response of universities to the permissive disclosure clauses of the Family Educational Rights and Privacy Act (FERPA). FERPA has been amended nine times; some of these amendments permit universities to disclose personally identifiable information without the permission of students. The purpose of this study is to…
Descriptors: Student Records, Privacy, Student Rights, Disclosure
Coleman, David W. – ProQuest LLC, 2012
Information Technology (IT) provides public sector organizations the capability to provide real increases in organizational effectiveness by aiding in the efficient exchange of information. Adoption of advanced IT such as service oriented environments, Web 2.0, and bespoke systems such as Enterprise Resource Planning (ERP) promises to markedly…
Descriptors: Information Technology, Public Sector, Web 2.0 Technologies, Case Studies
Amos, Kimberly S. – ProQuest LLC, 2013
In recent years, nursing faculty incivility has been a searing topic of research. Nursing research included studies on incivility among nursing students, incivility between nursing students and nursing faculty, and incivility in the clinical setting. However, literature specifically on nursing faculty incivility was limited. This descriptive,…
Descriptors: Nursing Education, Nurses, College Faculty, Teacher Behavior
Clerkin, Kris; Simon, Yvonne – Change: The Magazine of Higher Learning, 2014
This article presents a new model of education that works with employers to help their employees gain the skills and credentials needed for promotions and career mobility. Southern New Hampshire University's College for America, a competency-based education model for working adults, increases their access to, and the convenience of higher…
Descriptors: Competency Based Education, Student Centered Curriculum, Models, Student Projects
Data Quality Campaign, 2014
Education data can empower educators, students, parents, and policymakers with the information they need to make the best decisions to improve student achievement, information that can move the nation toward an education system in which every student graduates prepared for college and career. Safeguarding the privacy of student data is a critical…
Descriptors: Data, Misconceptions, Privacy, Student Records
Data Quality Campaign, 2011
Over the last five years, states have made significant progress implementing statewide longitudinal data systems (SLDS) to collect, store, link and share student-level data. States and the many national organizations supporting their efforts recognized that while building and using these indispensable data systems are important for policy,…
Descriptors: Student Records, Privacy, Information Policy, Confidentiality
Magi, Trina J. – Library Quarterly, 2011
Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…
Descriptors: Political Science, Intellectual Freedom, Anthropology, Library Science

Peer reviewed
Direct link
