Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedVoakes, Paul S. – Journalism and Mass Communication Quarterly, 1998
Contributes to scholarship on journalism law and journalism ethics by probing 42 journalists' decision-making processes in news gathering situations that resulted in lawsuits for invasion of privacy. Indicates that journalists were generally unaware of impending legal trouble; and that legal reasoning takes place in a "total context" of social…
Descriptors: Decision Making, Ethics, Higher Education, Journalism
Peer reviewedFerris, Lori E. – American Journal of Evaluation, 2000
Focuses on ethical and legal issues that arose in the evaluation of abortion services. Discusses the development of decision rules and tradeoffs in dealing with these issues to reach rational and objective decisions. Places the discussion in the context of balancing usefulness and propriety with respect to informed consent and privacy and makes…
Descriptors: Abortions, Decision Making, Ethics, Evaluation Methods
Peer reviewedSamoriski, Jan H.; And Others – Journal of Broadcasting & Electronic Media, 1996
Attempts to clarify the status of e-mail privacy under the Electronic Communications Privacy Act of 1986 (ECPA). Examines current law and the paucity of definitive case law. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e-mail,…
Descriptors: Computer Security, Electronic Mail, Information Policy, Laws
Peer reviewedAidman, Amy – Educational Leadership, 2000
The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…
Descriptors: Elementary Secondary Education, Federal Legislation, Internet, Privacy
Dowling-Sendor, Benjamin – American School Board Journal, 2002
Discusses Oklahoma case ("Owasso Independent School District No. 1-001 v. Falvo") wherein the Supreme Court ruled unanimously in February 2002 that peer grading did not violate the Family Education Rights and Privacy Act (FERPA). (PKP)
Descriptors: Court Litigation, Elementary Secondary Education, Grading, Privacy
Peer reviewedFarah, Badie N.; Higby, Mary A. – Journal of Education for Business, 2001
Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)
Descriptors: Business Responsibility, Data Collection, Federal Regulation, Privacy
Peer reviewedDeal, Walter F., III – Technology Teacher, 2004
Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna…
Descriptors: Identification, Telecommunications, Technological Advancement, Privacy
McCarthy, Martha M. – Educational Horizons, 2004
Accompanying the explosive growth of the Internet have been concerns about protecting children from viewing pornographic and other harmful images through cyberspace. In the past few years, Congress has passed several acts to censor Internet sites available to children, but only the Children's Internet Protection Act (CIPA) has received Supreme…
Descriptors: Libraries, Internet, Federal Legislation, Pornography
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Kranich, Nancy – Knowledge Quest, 2007
Teenagers will freely give up personal information to join social networks on the Internet. However, a 2007 study by the Pew Internet and American Life project found that most of the 55 percent of teens who place their personal profiles online take steps to protect themselves from the most obvious areas of risk. Parents, teachers, and librarians…
Descriptors: Risk, Social Networks, Internet, Librarians
Rasmussen, Chris; Johnson, Gina – Midwestern Higher Education Compact, 2008
This report is the result of a nationwide survey conducted in March 2008 of student life officers and campus safety directors to assess the impact of the April 2007 shootings at Virginia Tech on campus safety and security policy and practice. Discussion areas include: (1) Student Privacy vs. Need-to-Know; (2) Prevention, Mitigation and Recovery;…
Descriptors: Tragedy, Campuses, Student Behavior, Mental Disorders
McKee, Heidi; Porter, James E. – College Composition and Communication, 2008
The study of writers and writing in digital environments raises distinct and complex ethical issues for researchers. Rhetoric theory and casuistic ethics, working in tandem, provide a theoretical framework for addressing such issues. A casuistic heuristic grounded in rhetorical principles can help digital writing researchers critically…
Descriptors: Writing (Composition), Computer Mediated Communication, Electronic Publishing, Computer Uses in Education
Arntfield, Mike – Bulletin of Science, Technology & Society, 2008
This article interrogates the relationship between technology and law enforcement and how changing police surveillance techniques have influenced Western expectations of privacy from the mid-19th century to the present. By examining the evolution of telecommunications devices in particular, the author identifies a diffuse and publicly inclusive…
Descriptors: Privacy, Law Enforcement, Telecommunications, Foreign Countries
National Center for Education Statistics, 2006
The Forum Guide to the Privacy of Student Information: A Resource for Schools was written to help school and local education agency staff better understand and apply The Family Educational Rights and Privacy Act (FERPA), a federal law that protects privacy interests of parents and students in student education records. The Forum has developed…
Descriptors: Guidance, Federal Legislation, Confidentiality, School Districts
Uerling, Donald F. – Journal of Women in Educational Leadership, 2006
Abortion is one of the most controversial and contentious issues of our time. Few topics generate as much public debate or leave as little room for political compromise. This article presents a discussion of selected United States Supreme Court decisions on abortion and the legal reasoning supporting those decisions. It should be noted initially…
Descriptors: Pregnancy, Court Litigation, Females, Federal Legislation

Direct link
