Publication Date
| In 2026 | 0 |
| Since 2025 | 184 |
| Since 2022 (last 5 years) | 617 |
| Since 2017 (last 10 years) | 1246 |
| Since 2007 (last 20 years) | 2121 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| Australia | 81 |
| United States | 80 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 28 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedSampson, James P., Jr.; Lumsden, Jill A. – Journal of Career Assessment, 2000
Addresses ethical issues regarding Internet career assessment: reliability, validity, user readiness, administration, lack of practitioner awareness, equitable access, confidentiality, and privacy. Makes recommendations in the areas of research and development, training, standards, and stable funding of assessment development. (SK)
Descriptors: Career Counseling, Ethics, Internet, Privacy
Peer reviewedBlaszczynski, Carol – Delta Pi Epsilon Journal, 1998
Defines ethical research and associated terms: codes of ethics, informed consent, privacy, confidentiality, and data treatment. Addresses issues in the dissemination of research results, such as plagiarism and authorship. (SK)
Descriptors: Business Education, Confidentiality, Educational Research, Ethics
Kresses, Mamie – Principal, 2001
Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)
Descriptors: Elementary Secondary Education, Federal Legislation, Internet, Privacy
Ziff, Matthew – Journal of Aesthetic Education, 2004
Advances in glass technologies are being applied in contemporary interior architecture. Glass forms and surfaces are appearing in settings and applications that offer vivid aesthetic experiences for users, but create ambiguous messages concerning community and privacy. Where a modernist application of glass may have been directed toward creating a…
Descriptors: Architecture, Structural Elements (Construction), Aesthetics, Interior Space
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Goldsborough, Reid – Black Issues in Higher Education, 2004
There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…
Descriptors: Internet, Electronic Mail, Computer Mediated Communication, Computer Security
Walsh, Kieran – Advances in Health Sciences Education, 2005
We live in a celebrity-obsessed world and our medical students are no more immune to the glamour of celebrity than anyone else. When teaching medical students about a certain medical illness I used to tell them about a celebrity who suffers from this illness. I did this to get their attention and to stimulate their interest but even though the…
Descriptors: Medical Students, Medical Education, Confidentiality, Privacy
Valentine, Sean; Kidwell, Roland E. – Quality Assurance in Education: An International Perspective, 2008
Purpose: This study aims to gauge business school student perceptions of the academic conduct of college professors, to determine students' ethical evaluations of certain potential faculty behaviors. The relationships between perceived faculty misconduct and several student demographic characteristics including sex and academic classification were…
Descriptors: Undergraduate Students, Teacher Effectiveness, Cheating, Familiarity
Bullis, Ronald K. – American Journal of Sexuality Education, 2008
Two recent federal court cases have addressed the constitutionality of using sexual surveys in public schools. This article compares these cases with an earlier case dealing with the same issue but reaching different results. This article also describes the constitutional rights of parents to educate their children and the school's rights to…
Descriptors: Public Schools, Parent Rights, Court Litigation, Sex Education
Rubinstein-Ávila, Eliane – Journal of Language and Literacy Education, 2009
Whether a study is qualitative or quantitative, the process of data collection is not as orderly as it may seem when described in published research reports, articles, or books. Data collection may be more challenging when conducting research across national and linguistic borders. In this article, I share and reflect upon the complex and messy…
Descriptors: Educational Research, Research Problems, Research Opportunities, Data Collection
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Buzzi, Marina, Ed. – InTech, 2010
E-Learning is a vast and complex research topic that poses many challenges in every aspect: educational and pedagogical strategies and techniques and the tools for achieving them; usability, accessibility and user interface design; knowledge sharing and collaborative environments; technologies, architectures, and protocols; user activity…
Descriptors: Cartoons, Foreign Countries, Electronic Learning, Distance Education
Bolt, Nancy, Ed.; Burge, Suzanne, Ed. – International Federation of Library Associations and Institutions (NJ1), 2008
Libraries of government departments provide information to policymakers, to government staff and employees, and, sometimes, to the general public. It is essential that libraries of government departments are organised and managed so as to collect and provide the information most needed by government decision makers, government workers, and the…
Descriptors: Government Libraries, Guidelines, Library Administration, User Needs (Information)
Biden, Joseph R. – 1988
The purpose of this proposed bill from the Judiciary Committee to the second session of the hundredth Congress is to preserve personal privacy with respect to the rental, purchase, or delivery of videotapes or similar audiovisual materials. The Video Privacy Protection Act prohibits videotape service providers from disclosing personally…
Descriptors: Confidential Records, Disclosure, Federal Legislation, Privacy

Direct link
