Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedMcLuhan, Marshall; Powers, Bruce – Journal of Communication, 1981
Describes some of the problems for the individual inherent in the rapidly expanding computerized field of credit and banking. Proposes that electronic fund transfer systems could virtually replace the use of cash. Warns that while such systems offer wide advantages to business, they threaten the individual's privacy. (JMF)
Descriptors: Automation, Banking, Civil Liberties, Computers
Peer reviewedMichigan Law Review, 1978
Concludes that laws prohibiting fornication and cohabitation are unconstitutional. Available from Michigan Law Review, Hutchins Hall, Ann Arbor, MI 48109; single issue $3.50. (Author/IRT)
Descriptors: Civil Liberties, Constitutional Law, Moral Issues, Moral Values
Peer reviewedNewborg, Donald L. – Child Welfare, 1979
Provides information on recent decisions in New York courts in cases involving the right of adult adoptees to inspect sealed adoption records. The effect of these decisions is that any change in the right of access to records must be brought about through legislation, not through the courts. (Author/SS)
Descriptors: Adopted Children, Civil Liberties, Confidential Records, Constitutional Law
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Peer reviewedRemley, Theodore P., Jr.; Herlihy, Barbara; Herlihy, Scott B. – Journal of Counseling & Development, 1997
Reviews the rationale that underlies privileged communication in counseling and discusses the nature of privilege. Describes the progress of a Supreme Court decision affecting privileged communication between licensed psychotherapists and their patients. Concludes with a legal analysis of the decision and its implications for counselors. (RJM)
Descriptors: Confidential Records, Confidentiality, Counseling, Counselor Client Relationship
Peer reviewedNucci, Larry – New Directions for Child Development, 1997
A personal area of behavior comprising matters of choice and privacy, and differentiated from convention and moral obligation, is a psychological requirement for the construction of a distinct and bounded self. Accurate investigations of this dynamic require differentiation between cultural ideology and conceptual frames of individuals. (Author)
Descriptors: Children, Context Effect, Cultural Influences, Culture
Peer reviewedLewandowski, Judith L. – Journal of School Violence, 2003
Used data collected by a trend analysis company on 111 Web sites commonly visited by children to identify specific privacy issues faced by children when exploring child-oriented and adult-oriented Web sites. Discusses the complexity of issues raised by the expansion of information technology. (SLD)
Descriptors: Children, Data Collection, Information Technology, Internet
Peer reviewedKeating, John J., III; Hafner, Arthur W. – Journal of Academic Librarianship, 2002
Describes business techniques for mass marketing, where information technologies are used to target discrete individuals or groups and promote customer interaction. Considers the applicability of business concepts to academic library service, including uniquely identifying patrons, issues of privacy, focusing on the most valuable library services,…
Descriptors: Academic Libraries, Higher Education, Information Technology, Library Services
Peer reviewedPetras, Richard T. – Mathematics Teacher, 2001
Introduces RSA, one of the most popular public-key cryptosystems that is used to protect the privacy of computer users. Describes the mathematical foundation of public key cryptography. (KHR)
Descriptors: Cryptography, Curriculum Development, Internet, Mathematical Applications
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Wallace, Richard C. – School Administrator, 1990
Although no school leader likes media coverage of sensitive issues, handling them forthrightly and candidly benefits everyone. The three major facets of an effective media campaign include realistic expectations of the media, personalizing media relations, and controlling both access and message. (MLH)
Descriptors: Administrator Responsibility, Elementary Secondary Education, Expectation, Journalism
Peer reviewedCooper, Stephen – New Jersey Journal of Communication, 1995
States that the right of the public to know and the right of the individual to privacy are inherently in conflict. Examines the relationship between privacy law and the press. Observes that conditions with the birth of new electronic media are similar to those of a century ago, when two lawyers sued for relief from aggressive journalists. (PA)
Descriptors: Conflict, Court Litigation, Freedom of Information, Freedom of Speech
Smoot, Oliver – EDUCOM Review, 1994
Examines the relationship between the National Information Infrastructure (NII) and the new General Agreement on Tariffs and Trade. Topics discussed include the reduction or elimination of tariffs on NII products; protection of copyrighted works; unresolved trade issues, including the European telecommunications market; standards; and privacy and…
Descriptors: Computer Networks, Copyrights, Foreign Countries, Information Networks
Peer reviewedSrinivasan, Srinija – Government Information Quarterly, 1992
Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…
Descriptors: Access to Information, Civil Liberties, Cultural Traits, Databases
Peer reviewedZirkel, Perry A. – Journal of Law and Education, 2000
In the April 1999 issue of this journal, Michael Ferraraccio argues that the justifications advanced for using metal detectors in schools are not sufficiently compelling to outweigh students' Fourth Amendment privacy rights. In the accompanying Counterpoint, Robert Johnson cites lower court cases to support the constitutionality of their used on a…
Descriptors: Court Litigation, Elementary Secondary Education, Privacy, Public Schools


