NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,086 to 2,100 of 3,386 results Save | Export
Shieh, Jackie; Ballard, Rhea A-L – EDUCOM Review, 1994
Examines the relationship between electronic mail (E-mail) and employee privacy rights. Two current course cases involving the privacy issue are summarized; the Electronic Communications Privacy Act of 1986 is explained; proposed legislation is discussed; and suggestions for employee E-mail privacy that can help avoid possible litigation are…
Descriptors: Court Litigation, Electronic Mail, Federal Legislation, Legal Responsibility
Peer reviewed Peer reviewed
Sethna, Beheruz; Barnes, Cynthia C.; Brust, Melvin; Kaye, Lory – Journal of Education for Business, 1999
Responses from 134 of 301 accredited business schools showed the following: (1) 58% had policies on electronic communication; (2) only 9% of administrators accessed faculty e-mails; and (3) 69% believed administrators should have access if they suspected offensive information, whereas only 46% considered prevention of institutional liability a…
Descriptors: Educational Administration, Electronic Mail, Higher Education, Privacy
Daly, Janet – Proceedings of the ASIS Annual Meeting, 2000
Provides an overview of a planned session to describe the work of the World Wide Web Consortium, including technical specifications for HTML (Hypertext Markup Language), XML (Extensible Markup Language), CSS (Cascading Style Sheets), and over 20 other Web standards that address graphics, multimedia, privacy, metadata, and other technologies. (LRW)
Descriptors: Computer Graphics, Consortia, Metadata, Privacy
Peer reviewed Peer reviewed
Sampson, James P., Jr.; Lumsden, Jill A. – Journal of Career Assessment, 2000
Addresses ethical issues regarding Internet career assessment: reliability, validity, user readiness, administration, lack of practitioner awareness, equitable access, confidentiality, and privacy. Makes recommendations in the areas of research and development, training, standards, and stable funding of assessment development. (SK)
Descriptors: Career Counseling, Ethics, Internet, Privacy
Peer reviewed Peer reviewed
Blaszczynski, Carol – Delta Pi Epsilon Journal, 1998
Defines ethical research and associated terms: codes of ethics, informed consent, privacy, confidentiality, and data treatment. Addresses issues in the dissemination of research results, such as plagiarism and authorship. (SK)
Descriptors: Business Education, Confidentiality, Educational Research, Ethics
Kresses, Mamie – Principal, 2001
Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)
Descriptors: Elementary Secondary Education, Federal Legislation, Internet, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Ziff, Matthew – Journal of Aesthetic Education, 2004
Advances in glass technologies are being applied in contemporary interior architecture. Glass forms and surfaces are appearing in settings and applications that offer vivid aesthetic experiences for users, but create ambiguous messages concerning community and privacy. Where a modernist application of glass may have been directed toward creating a…
Descriptors: Architecture, Structural Elements (Construction), Aesthetics, Interior Space
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Goldsborough, Reid – Black Issues in Higher Education, 2004
There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…
Descriptors: Internet, Electronic Mail, Computer Mediated Communication, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Walsh, Kieran – Advances in Health Sciences Education, 2005
We live in a celebrity-obsessed world and our medical students are no more immune to the glamour of celebrity than anyone else. When teaching medical students about a certain medical illness I used to tell them about a celebrity who suffers from this illness. I did this to get their attention and to stimulate their interest but even though the…
Descriptors: Medical Students, Medical Education, Confidentiality, Privacy
Bolt, Nancy, Ed.; Burge, Suzanne, Ed. – International Federation of Library Associations and Institutions (NJ1), 2008
Libraries of government departments provide information to policymakers, to government staff and employees, and, sometimes, to the general public. It is essential that libraries of government departments are organised and managed so as to collect and provide the information most needed by government decision makers, government workers, and the…
Descriptors: Government Libraries, Guidelines, Library Administration, User Needs (Information)
Buzzi, Marina, Ed. – InTech, 2010
E-Learning is a vast and complex research topic that poses many challenges in every aspect: educational and pedagogical strategies and techniques and the tools for achieving them; usability, accessibility and user interface design; knowledge sharing and collaborative environments; technologies, architectures, and protocols; user activity…
Descriptors: Cartoons, Foreign Countries, Electronic Learning, Distance Education
Peer reviewed Peer reviewed
Direct linkDirect link
Jenkins, Peter; Potter, Steve – British Journal of Guidance & Counselling, 2007
The introduction of the Data Protection Act 1998 has presented significant challenges to counselling recording, through its detailed requirements for the processing of personal data. The impact of these changes on recording in Higher Education counselling services in the UK is explored, using responses from an electronic survey of universities and…
Descriptors: Higher Education, Professional Autonomy, Accountability, Privacy
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security
Carnevale, Dan – Chronicle of Higher Education, 2007
The USA Patriot Act is having far-reaching effects on the kinds of data that wind up on some academics' computers in Canada. Canadian colleges, responding to provincial laws passed in reaction to the Patriot Act, are preventing professors from entering the United States with students' private data on their laptops and limiting the locations of…
Descriptors: Higher Education, Public Colleges, Foreign Countries, Federal Legislation
Pages: 1  |  ...  |  136  |  137  |  138  |  139  |  140  |  141  |  142  |  143  |  144  |  ...  |  226