NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,071 to 2,085 of 3,403 results Save | Export
Peer reviewed Peer reviewed
George, Joey F. – Internet Research, 2002
Using the theory of planned behavior as the theoretical base, data collected through a semi-annual survey of Web users were used to determine if beliefs about privacy and Internet trustworthiness helped determine attitudes toward the Internet, which were thought to affect intent to make Internet purchases. (Author/LRW)
Descriptors: Attitudes, Decision Making, Intention, Internet
Peer reviewed Peer reviewed
McIntyre, Tom; Tong, Virginia M.; Perez, Joseph F. – Journal of Correctional Education, 2001
Outlines concerns about Internet use by incarcerated youth such as use of e-mail for criminal activity and privacy and censorship of online communications. Gives guidelines for Internet use that would address concerns while giving these youth access to the educational advantages of the technology. (SK)
Descriptors: Adolescents, Computers, Correctional Education, Internet
Maxwell, Lesli A. – Education Week, 2006
This article discusses a new state law which has stirred up a fierce dispute over privacy rights, as innocent school employees in Michigan have begun learning that they have been misidentified as criminals. The Student Safety Initiative, a series of laws that took effect January 1, required Michigan school districts to obtain criminal-background…
Descriptors: State Legislation, Privacy, School Law, School Personnel
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Tracy – CUPA-HR Journal, 2003
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Descriptors: Human Resources, Colleges, Computer Security, Privacy
Read, Brock – Chronicle of Higher Education, 2006
Students in the US are increasingly discovering that online socializing is far from private and that sharing personal details on social-networking Web sites, such as Facebook, can have unintended consequences. A growing number of colleges are moving to disabuse students of the notion that the Internet is their private playground and what they type…
Descriptors: Internet, Web Sites, Social Networks, Privacy
West, Darrell M.; Whitehurst, Grover J.; Dionne, E. J., Jr. – Brookings Institution, 2009
News coverage is important to every policy area. While some people have personal knowledge of certain topics, many rely on mass media for direct, up-to-date, and in-depth reporting. This is especially the case with education because only a third of American adults currently have a child in elementary or secondary school. What most people know…
Descriptors: News Reporting, News Media, Mass Media Role, Publicity
Totterdale, Robert L. – ProQuest LLC, 2009
Businesses have always maintained records pertinent to the enterprise. With over 90% of new business records now estimated to be available in electronic form, organizations struggle to manage these vast amounts of electronic content while at the same time meeting collaboration, knowledge management, regulatory, and compliance needs. This case…
Descriptors: Information Management, Classification, Information Technology, Employee Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Meert, Kathleen L.; Briller, Sherylyn H.; Myers Schim, Stephanie; Thurston, Celia; Kabel, Allison – Death Studies, 2009
The pediatric intensive care unit (PICU) is a high-tech setting aimed at restoring health to critically ill children. When childhood death occurs in the PICU, it constitutes a special context for parent bereavement. The purpose of this interdisciplinary qualitative research was to gain a deeper understanding of parents' needs around the time of…
Descriptors: Grief, Qualitative Research, Focus Groups, Health Personnel
Palestini, Robert; Falk, Karen Palestini – Rowman & Littlefield Education, 2012
This third edition expands coverage on such topics as the law and students with disabilities, confidentiality, sexual harassment, student searches and tuition vouchers. It also includes some new topics such as bullying, copyright law, and the law and the internet. Both public and nonpublic school educators are aware that courts, over the last…
Descriptors: School Law, Court Litigation, Public Schools, Private Schools
Federal Student Aid, US Department of Education, 2011
This publication is intended for financial aid administrators and counselors who help students begin the aid process--filing the Free Application for Federal Student Aid (FAFSA), verifying information, and making corrections and other changes to the information reported on the FAFSA. The Federal Student Aid Handbook consists of the Application and…
Descriptors: Student Financial Aid, Federal Aid, Student Loan Programs, Grants
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Warnick, Bryan R. – Harvard Educational Review, 2007
In this essay, Bryan R. Warnick responds to the increasing use of surveillance cameras in public schools by examining the ethical questions raised by their use. He explores the extent of a student's right to privacy in schools, stipulates how video surveillance is similar to and different from commonly accepted in-person surveillance practices,…
Descriptors: School Security, Ethics, Public Schools, Student Rights
Lipka, Sara – Chronicle of Higher Education, 2007
People connect on Facebook by asking to "friend" one another. A typical user lists at least 100 such connections, while newbies are informed, "You don't have any friends yet." A humbling statement. It might make one want to find some. But friending students can be even dicier than befriending them. In the real world, casual professors may ask…
Descriptors: Profiles, Ethics, College Faculty, Computer Mediated Communication
Albanese, Andrew; Bardales, Aida; Berry, John N., III; Datema, Jay; Fialkoff, Francine; Fox, Bette-Lee; Oder, Norman; Rogers, Michael; Williams, Wilda – Library Journal, 2007
This article presents the highlights of the 2007 American Library Association (ALA) annual conference held at the Washington Convention Center in Washington, D.C. Hundreds of librarians showed up early for a day of service, volunteering in libraries, schools, and other Washington-area institutions. As the conference wound down, some 2000…
Descriptors: Libraries, Library Associations, Librarians, Conferences (Gatherings)
Peer reviewed Peer reviewed
Direct linkDirect link
Staros, Kari; Williams, Charles F. – Social Education, 2007
The Fourth Amendment to the U.S. Constitution protects the people of the United States from unreasonable searches and seizures. On first reading, these protections seem clearly defined. The amendment was meant to protect Americans from the kinds of random searches and seizures that the colonists experienced under British colonial rule. Under…
Descriptors: Search and Seizure, Court Litigation, Constitutional Law, Privacy
Pages: 1  |  ...  |  135  |  136  |  137  |  138  |  139  |  140  |  141  |  142  |  143  |  ...  |  227