Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gordon, Milton A.; Gordon, Margaret F. – New Directions for Higher Education, 1996
New college presidents are inundated with requests for their time, and their private life is often sacrificed. Each administrator must decide what is the appropriate balance among various aspects of his/her position. Physical separation of public and private lives is essential, and the role of the spouse, who may have other professional…
Descriptors: Administrator Role, College Administration, College Presidents, Entry Workers
Peer reviewedSidbury, Benjamin F. – Journal of College and University Law, 2000
Examines problems in the 1998 Amendment to the Family Education Rights and Privacy Act (FERPA) in its application to student disciplinary records. Reviews enactment and development of FERPA and discusses recent debate over "educational records" provision. Argues that Congress should amend FERPA to expressly mandate that universities…
Descriptors: College Students, Colleges, Confidentiality, Crime
Peer reviewedSmith, Bruce; Fraser, Bruce T.; McClure, Charles R. – Journal of Academic Librarianship, 2000
Considers selected policy instruments related to federal agencies' deployment of information in a Web environment in terms of five key policy areas: access, security, privacy, intellectual property, and records management. Suggests that there are a significant number of policy instruments affecting federal Web site development. Identifies the need…
Descriptors: Access to Information, Computer Security, Document Delivery, Government Publications
Peer reviewedInsights on Law & Society, 2000
Focuses on the hate speech, gun, and privacy debates that today's youth will have to address in their future. Includes articles addressing the arguments in each issue: (1) "Debating Hate Speech" (Frank Kopecky); (2) "Debating the Gun Issue" (Denise Barr); and (3) "Debating the Right to Privacy" (Pinky Wassenberg.)…
Descriptors: Constitutional Law, Court Litigation, Educational Strategies, Freedom of Speech
Lynch, Clifford – CAUSE/EFFECT, 1998
Describes access management problems associated with networked information systems and the two major architectural approaches used to address them, including discussion of related policy issues such as privacy, accountability, and collection of management data. Focus is on the concerns of colleges and universities and on developing practical…
Descriptors: Access to Information, Accountability, Administrative Policy, College Administration
Peer reviewedLogan, Elisabeth; Hsieh-Yee, Ingrid – Annual Review of Information Science and Technology (ARIST), 2001
Reviews major aspects of library and information science education during the decade of the 1990s. Topics include historical context; the political climate; copyright, access, and privacy; the social climate; technological context; economic context; changes in administration, the profession, programs, curriculum, and faculty; and future…
Descriptors: Access to Information, Administrative Change, Copyrights, Curriculum
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Kinsella, Mary P. – Journal of School Leadership, 2004
This study explores the process one school district employed in its search for, and selection of, a new superintendent. The research design is a single site case study using qualitative methods. Data collection techniques include observation in the form of "shadowing" a search consultant, document analysis, and open-ended interviews of…
Descriptors: Credentials, Employment Practices, Search Committees (Personnel), Privacy
Edwards, Mark; Jones, Steve; Murphy, Fiona – Innovations in Education and Teaching International, 2007
In health care education a balance needs to be struck between theoretical and practical teaching. Undergraduates typically split their time between clinical placement and university-based teaching blocks. A proportion of the time spent in preparation for clinical practice placements will be spent in the classroom or in simulation suites. The…
Descriptors: Clinical Experience, Allied Health Occupations Education, Theory Practice Relationship, Higher Education
Eckes, Suzanne; McCarthy, Martha – National Association of Secondary School Principals (NASSP), 2006
Newly hired teachers regularly have questions about whether their lifestyles and actions outside of school could have repercussions on their career. Because they are expected to be role models for their students and thus held to a higher level of discretion than the general citizenry, educators have had restrictions placed on their living…
Descriptors: Role Models, Privacy, School Personnel, Teacher Rights
Berson, Ilene R.; Berson, Michael J. – Social Education, 2006
Internet users continue to develop new ways of communicating online and disseminating information; one of these methods, the blog, also known as web log, has become a significant cultural phenomenon. Blogs offer an interactive medium for internet users to create and contribute content to the web. In some social studies classrooms, teachers are…
Descriptors: Social Studies, Current Events, Internet, Web Sites
Ravitz, Jason – 1997
This paper discusses professional ethical concerns for individuals conducting research in electronic collaborative environments. Existing professional codes of ethics were reviewed, and respected figures in the field of educational technology were engaged in conversations about ethics, professional communication, and new technologies. When…
Descriptors: Codes of Ethics, Computer Mediated Communication, Ethics, Higher Education
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Forner, Michelle L., Ed.; Richard, Theresa M., Ed. – 1994
This teacher's guide presents effective strategies to implement the "Foundations of Democracy" textbook, which introduces four concepts basic to the United States Constitution: authority, privacy, responsibility, and justice. The guide explains that the success of citizenship education programs depends on extensive interaction among…
Descriptors: Citizenship Education, Constitutional History, Constitutional Law, Democracy
Wright, Gretchen McHenry – 1993
This study of four public libraries in Northeastern Ohio was conducted to determine the amount, if any, of restriction of access of materials to minors. Four libraries were opportunistically selected, and the director and children's librarian in each were interviewed. The emerging hypothesis was that some restriction would occur. The written…
Descriptors: Access to Information, Adolescents, Censorship, Children

Direct link
