Publication Date
| In 2026 | 0 |
| Since 2025 | 182 |
| Since 2022 (last 5 years) | 615 |
| Since 2017 (last 10 years) | 1244 |
| Since 2007 (last 20 years) | 2119 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| Australia | 80 |
| United States | 80 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 28 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet
Anderson, Catherine L. – ProQuest LLC, 2010
Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. This dissertation seeks to improve extant understanding of how…
Descriptors: Cues, Health Education, Hospitals, Health Conditions
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Data Quality Campaign, 2010
The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…
Descriptors: Information Security, Stakeholders, Technical Assistance, Feedback (Response)
Computer and Business Equipment Manufacturers Association, Washington, DC. – 1979
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
Descriptors: Bibliographies, Computers, Data Processing, Information Systems
Peer reviewedFerguson, Lucy Rau – Journal of Social Issues, 1978
This paper holds that children should participate in research only under conditions of adequately informed consent, that parents must be fully informed about research procedures and purposes, but that parental consent is a sufficient condition only for children without adequate capacity for informed choice. (Author)
Descriptors: Child Welfare, Experiments, Parent Role, Participation
Siehl, George – Library Journal, 1972
From sampling the sensational and the scholarly literature cited in this article, one can piece together a representative picture of the American intelligence community. (42 references) (Author/NH)
Descriptors: Annotated Bibliographies, Books, Federal Government, Fiction
Flygare, Thomas J. – Phi Delta Kappan, 1979
The legality of warrantless searches of students depends on the kind of search that takes place and what happens to any evidence obtained during the search. (Author/IRT)
Descriptors: High School Students, Privacy, Search and Seizure, Secondary Education
Marwick, Christine M. – Library Journal, 1979
Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)
Descriptors: Censorship, Confidentiality, Federal Regulation, Information Dissemination
Peer reviewedFriedman, Batya – Computers in Human Behavior, 1997
Describes two complementary studies that were conducted to understand the diverse views adolescents hold regarding electronic information. One study examined high school students' concepts of property pertaining to copying computer programs; the other examined concepts of privacy pertaining to accessing computer files. (56 references) (Author/LRW)
Descriptors: Adolescents, Computer Software, Privacy, Secondary Education
Shieh, Jackie; Ballard, Rhea A-L – EDUCOM Review, 1994
Examines the relationship between electronic mail (E-mail) and employee privacy rights. Two current course cases involving the privacy issue are summarized; the Electronic Communications Privacy Act of 1986 is explained; proposed legislation is discussed; and suggestions for employee E-mail privacy that can help avoid possible litigation are…
Descriptors: Court Litigation, Electronic Mail, Federal Legislation, Legal Responsibility
Peer reviewedSethna, Beheruz; Barnes, Cynthia C.; Brust, Melvin; Kaye, Lory – Journal of Education for Business, 1999
Responses from 134 of 301 accredited business schools showed the following: (1) 58% had policies on electronic communication; (2) only 9% of administrators accessed faculty e-mails; and (3) 69% believed administrators should have access if they suspected offensive information, whereas only 46% considered prevention of institutional liability a…
Descriptors: Educational Administration, Electronic Mail, Higher Education, Privacy
Daly, Janet – Proceedings of the ASIS Annual Meeting, 2000
Provides an overview of a planned session to describe the work of the World Wide Web Consortium, including technical specifications for HTML (Hypertext Markup Language), XML (Extensible Markup Language), CSS (Cascading Style Sheets), and over 20 other Web standards that address graphics, multimedia, privacy, metadata, and other technologies. (LRW)
Descriptors: Computer Graphics, Consortia, Metadata, Privacy
Peer reviewedSampson, James P., Jr.; Lumsden, Jill A. – Journal of Career Assessment, 2000
Addresses ethical issues regarding Internet career assessment: reliability, validity, user readiness, administration, lack of practitioner awareness, equitable access, confidentiality, and privacy. Makes recommendations in the areas of research and development, training, standards, and stable funding of assessment development. (SK)
Descriptors: Career Counseling, Ethics, Internet, Privacy
Peer reviewedBlaszczynski, Carol – Delta Pi Epsilon Journal, 1998
Defines ethical research and associated terms: codes of ethics, informed consent, privacy, confidentiality, and data treatment. Addresses issues in the dissemination of research results, such as plagiarism and authorship. (SK)
Descriptors: Business Education, Confidentiality, Educational Research, Ethics

Direct link
