Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy
Shachtman, Tom – Media and Methods, 1977
Reflects on the exploitation of documentary film subjects--the dangers it poses as well as the responsibilities it presents. (Author/KS)
Descriptors: Documentaries, Ethics, Films, Privacy
Conable, Gordon – American Libraries, 1990
Discusses investigation of librarians by the FBI (Federal Bureau of Investigation) and the status of the Library Awareness Program. An American Library Association (ALA) resolution opposing FBI activities in libraries and demanding release of individual files to persons subjected to checks is described. A model letter for individuals to use in…
Descriptors: Freedom of Information, Librarians, Library Associations, Privacy
Kennedy, Mike – American School & University, 2000
Discusses the integration of the school intercom system with phones in the classroom to enhance main office to classroom communication with an element of privacy. The contribution of classroom phones to safety and security issues is highlighted. (GR)
Descriptors: Communications, Elementary Secondary Education, Privacy, Public Schools
Markell, Ginny – Our Children, 2000
Presents four tips to help parents monitor whether website operators are complying with the 1988 Children's Online Privacy Protection Act: look for privacy policies on children's websites; determine if they ask for parental consent to collect personal information; regularly monitor information being sent to children; and determine if web operators…
Descriptors: Elementary Secondary Education, Internet, Parent Responsibility, Privacy
Peer reviewedExtejt, Marian M. – Business Communication Quarterly, 1998
Discusses current standards for formatting and etiquette of electronic mail in the business setting. Discusses privacy and appropriate content. Notes that class assignments involving electronic mail provide practical opportunities to develop ease with this form. (SR)
Descriptors: Business Communication, Electronic Mail, Higher Education, Privacy
Peer reviewedDe Maeyer, Dirk – Internet Research, 1997
Examines the Internet's potential for becoming an information highway. Highlights include definitions of the information highway and the Internet; the infrastructure of an information highway; capacity; connectivity; simultaneity; network protocols; applications; interactivity; openness; mobility and remote access; universal access; affordable…
Descriptors: Access to Information, Computer Security, Internet, Privacy
Reynolds, Ben – Technology & Learning, 2005
"Sleazeware" is the authors' term for spyware, adware, malware, trackware, foistware, trojans, and other programs that sleaze into computers, either as a hidden component or by tricking someone into downloading them. Once in the machine, the program phones home for purposes ranging from simply reporting where people browse to downloading…
Descriptors: Information Retrieval, Internet, Privacy, Computer Security
Malerba, Cathy – Online Submission, 2007
This report summarizes external research requests submitted to and reviewed by Austin Independent School District staff during the 2006-2007 school year.
Descriptors: School Districts, Research Proposals, Educational Research, Program Evaluation
Fischer, Karin – Chronicle of Higher Education, 2007
Educators, mental-health officials, and law-enforcement officers often do not share information about troubled students because they are confused by what they can disclose under complex and overlapping privacy laws, according to a report on the Virginia Tech shootings. Attorney General Alberto R. Gonzales and two other Bush cabinet secretaries…
Descriptors: Student Records, Privacy, Laws, Reports
Ashby, Nicole, Ed. – US Department of Education, 2008
"The Achiever" is a monthly publication for parents and community leaders. Each issue contains news and information about school improvement in the United States. Highlights of this issue include: (1) "Promising Gains" among Urban School Districts: Nation's Report Card Reveals Greatest Increases in Math; (2) Tying Names to…
Descriptors: Privacy, Educational Change, Values Education, Educational Improvement
Calvert, Sandra L. – Future of Children, 2008
Marketing and advertising support the U.S. economy by promoting the sale of goods and services to consumers, both adults and children. Sandra Calvert addresses product marketing to children and shows that although marketers have targeted children for decades, two recent trends have increased their interest in child consumers. First, both the…
Descriptors: Advertising, Video Games, Audiences, Marketing
Blumenstein, Lynn; Berry, John; Fialkoff, Francine; Fox, Bette-Lee; Hadro, Josh; Horrocks, Norman; Oder, Norman; Roncevic, Mirela – Library Journal, 2008
If the resort city of Anaheim, California, home of Disneyland and its "imagineers," marked a departure from the urban reality of the typical American Library Association (ALA) annual conference, it was impossible, at this 2008 meeting, to avoid urgent library issues. How do libraries maintain their value and cultural presence as users…
Descriptors: Conferences (Gatherings), Professional Associations, Library Services, Library Education
Hawk, Skyler T.; Hale, William W., III; Raaijmakers, Quinten A. W.; Meeus, Wim – Journal of Early Adolescence, 2008
Following suggestions from prior research, this 2-wave longitudinal study examined whether parental solicitation and control influenced adolescents' later perceptions of privacy invasion. Data from 307 Dutch adolescents were tested with structural equation modeling (SEM). Differences in adolescents' invasion perceptions were examined in terms of…
Descriptors: Structural Equation Models, Parent Child Relationship, Adolescents, Adolescent Attitudes
Data Quality Campaign, 2010
State education data systems have often been described as data rich but information poor. Historically, these systems were created for compliance purposes and, therefore, designed and managed as information technology projects, but a culture change is under way. Educators and other stakeholders are beginning to value data as a tool to inform…
Descriptors: Information Technology, Information Needs, Stakeholders, Data Collection

Direct link
