Publication Date
| In 2026 | 0 |
| Since 2025 | 184 |
| Since 2022 (last 5 years) | 617 |
| Since 2017 (last 10 years) | 1246 |
| Since 2007 (last 20 years) | 2121 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| Australia | 81 |
| United States | 80 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 28 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedAidman, Amy – Educational Leadership, 2000
The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…
Descriptors: Elementary Secondary Education, Federal Legislation, Internet, Privacy
Dowling-Sendor, Benjamin – American School Board Journal, 2002
Discusses Oklahoma case ("Owasso Independent School District No. 1-001 v. Falvo") wherein the Supreme Court ruled unanimously in February 2002 that peer grading did not violate the Family Education Rights and Privacy Act (FERPA). (PKP)
Descriptors: Court Litigation, Elementary Secondary Education, Grading, Privacy
Peer reviewedFarah, Badie N.; Higby, Mary A. – Journal of Education for Business, 2001
Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)
Descriptors: Business Responsibility, Data Collection, Federal Regulation, Privacy
Peer reviewedDeal, Walter F., III – Technology Teacher, 2004
Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna…
Descriptors: Identification, Telecommunications, Technological Advancement, Privacy
McCarthy, Martha M. – Educational Horizons, 2004
Accompanying the explosive growth of the Internet have been concerns about protecting children from viewing pornographic and other harmful images through cyberspace. In the past few years, Congress has passed several acts to censor Internet sites available to children, but only the Children's Internet Protection Act (CIPA) has received Supreme…
Descriptors: Libraries, Internet, Federal Legislation, Pornography
Moriya, Dafna – Art Therapy: Journal of the American Art Therapy Association, 2006
School art therapists face numerous ethical dilemmas, from referrals to therapy, through privacy, safety and predictability in the art therapy room, to the need to balance cooperation with the educational staff and its expectations of shared information with loyalty to the patient. Breach of confidentiality also has legal implications. The…
Descriptors: Confidentiality, Art Therapy, Ethics, Privacy
Kurowski, Scotia; Reiss, Rebecca – American Biology Teacher, 2007
This article describes a forensic DNA science laboratory exercise for advanced high school and introductory college level biology courses. Students use a commercial genotyping kit and genetic analyzer or gene sequencer to analyze DNA recovered from a fictitious crime scene. DNA profiling and STR genotyping are outlined. DNA extraction, PCR, and…
Descriptors: Science Laboratories, Persuasive Discourse, Biology, Privacy
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Honawar, Vaishali – Education Week, 2007
Videos of teachers that students taped in secrecy are all over online sites like YouTube and MySpace. Angry teachers, enthusiastic teachers, teachers clowning around, singing, and even dancing are captured, usually with camera phones, for the whole world to see. Some students go so far as to create elaborately edited videos, shot over several…
Descriptors: Internet, Telecommunications, Videotape Recordings, Teacher Rights
Talab, Rosemary S.; Butler, Rebecca P. – TechTrends: Linking Research and Practice to Improve Learning, 2007
The concept of "publishing" has changed again, just in the last few years, due to YouTube, Blogger, Second Life, Flickr, and other new social networking tools (John Marshall Law School, 2005). Whether they are making it possible for everyone to view a video on YouTube on how to install a hard drive on a Mac, add a collaborative student writing…
Descriptors: Guidelines, Privacy, Copyrights, Internet
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Kranich, Nancy – Knowledge Quest, 2007
Teenagers will freely give up personal information to join social networks on the Internet. However, a 2007 study by the Pew Internet and American Life project found that most of the 55 percent of teens who place their personal profiles online take steps to protect themselves from the most obvious areas of risk. Parents, teachers, and librarians…
Descriptors: Risk, Social Networks, Internet, Librarians
Congress of the U.S., Washington, DC. Senate Committee on Governmental Affairs. – 1986
Submitted to Congress by Senator William V. Roth, Jr., of the Committee on Governmental Affairs, this document reports favorably on Senate Bill 786 (the Information Age Commission Act of 1986), legislation designed to establish a commission to study the impact of computer and communications systems on American society. The report provides: (1) a…
Descriptors: Communications, Computers, Costs, Federal Legislation
Larson, Jeffry H.; Bell, Nancy J. – 1983
Little is known about the implications of individual differences in privacy preferences. To explore the relationship between privacy preferences and the style and quality of social interaction in a first encounter, 77 of 320 college students completing the Privacy Preference Scale were grouped according to their low (20 male, 20 female) or high…
Descriptors: College Students, Higher Education, Individual Differences, Interaction
Werner, Carol; Haggard, Lois – 1984
The findings from a study of 42 administrators in a large metropolitan school district supported the hypothesis that the use of privacy regulation mechanisms is deliberate and dynamic. The researchers considered the age and sex of the administrators, the length of time they'd held their current jobs, their tendencies toward Type A or Type B…
Descriptors: Administrator Characteristics, Administrators, Coping, Hypertension

Direct link
