NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,836 to 2,850 of 3,401 results Save | Export
Peer reviewed Peer reviewed
Doty, Philip – Annual Review of Information Science and Technology (ARIST), 2001
Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…
Descriptors: Court Litigation, Entrepreneurship, Federal Legislation, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Milnitsky-Sapiro, Clary; Turiel, Elliot; Nucci, Larry – Cognitive Development, 2006
Thirty-two middle class and 32 lower class southern Brazilian pre-adolescent (M=12.8 years) and adolescent (M=15.7 years) participants were individually interviewed regarding their perceptions of who (adolescent or parent) should determine the adolescent's actions in cases where the parents and adolescent disagree over the action choice.…
Descriptors: Middle Class, Adolescents, Privacy, Parent Child Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Kivirauma, Joel; Klemela, Kirsi; Rinne, Risto – European Journal of Special Needs Education, 2006
In this paper, we try to examine the classical sociological points of special education, especially the organizational form of special education, social background of students and the minority status of students. The material of the study was collected mostly during 2003 from one large city in Finland. This city has more than a 100-year-long…
Descriptors: Foreign Countries, General Education, Socioeconomic Background, Social Class
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Berson, Ilene R.; Berson, Michael J. – International Journal of Social Education, 2006
The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy. It is the statutory right to privacy that has been most closely aligned with data protection as a form of self-protection. The U.S. Federal Trade Commission…
Descriptors: Privacy, Personal Autonomy, Child Advocacy, Access to Information
Harwood, Paul G.; Asal, Victor – Praeger, 2007
Asal and Harwood explore how today's information technology is changing how teachers educate and are educated. Focusing on the United States, with useful insights from the classroom digital revolution in a few other places (the United Kingdom, Australia, and India), the authors investigate the impact of today's technologies on education--how they…
Descriptors: Foreign Countries, Profiles, Internet, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Kubik, Martha Young; Story, Mary; Rieland, Gayle – Health Education & Behavior, 2007
School-based body mass index (BMI) screening and parent notification programs have been advanced as an obesity prevention strategy. However, little is known about how to develop and implement programs. This qualitative study explored the opinions and beliefs of parents of elementary school students concerning school-based BMI screening programs,…
Descriptors: Elementary School Students, Information Needs, Obesity, Body Composition
Peer reviewed Peer reviewed
Direct linkDirect link
Meisel, Joshua S. – Teaching Sociology, 2008
In this article I explore the ethical terrain of experiential learning activities drawing on my experiences leading college students on field trips into criminal justice settings. Though there are numerous educational benefits to adopting experiential learning activities, the rewards must be evaluated in light of the potential harms to nonstudent…
Descriptors: College Students, Field Trips, Criminals, Correctional Rehabilitation
Cheung, Oona; And Others – 1997
Education-agency and school staff are legally and ethically responsible for safeguarding student information. In addition to federal and state laws and regulations, education agencies need policies and procedures to guide their everyday information-maintenance operations. This document provides examples of policies and procedures as well as…
Descriptors: Compliance (Legal), Confidential Records, Confidentiality, Data Collection
Desser, Daphne – 1995
With each technological advancement--telephone, automobile, television, and modem--people gain convenience, efficiency, and speed; they lose immediacy, real as opposed to virtual community, and physicality. At a writer's computer conference, journal writers who have used a diary with a lock and key to keep writings private wonder how to reconcile…
Descriptors: Computer Mediated Communication, Higher Education, Journal Writing, Personal Writing
Ruberg, Laurie F.; Miller, Mary G. – 1993
The increasing use of computer technology for sending and receiving electronic mail messages not only signifies changes in how we communicate, but also signals changes in the skills, knowledge, and practices associated with communication by mail. Some of the characteristics of electronic mail (e-mail) are considered. E-mail refers to the capacity…
Descriptors: Computer Software, Cost Effectiveness, Electronic Equipment, Electronic Mail
Frostburg State Coll., MD. – 1990
A series of four speeches on law-related topics comprise this volume. The text of each speech along with comments of invited respondents are included. The presentations include: "Justice and Sentencing" (Daniel Moylan); "Law: Obedience and Civil Disobedience" (Linda Irvin); "Liberty--The Right of Privacy" (Allan Powell); and "Punishment: The Death…
Descriptors: Capital Punishment, Civil Disobedience, Civil Liberties, Constitutional Law
National Association of Secondary School Principals, Reston, VA. – 1983
The Family Educational Rights and Privacy Act (FERPA) provides students and parents access to their school records and requires that parents and adult students be informed of their rights under the act. FERPA also bars the release of records to third parties without written consent except to school district employees possessing legitimate…
Descriptors: Administrator Guides, Administrator Responsibility, Administrator Role, Court Litigation
Trager, Robert – 1987
The press and public should have access to pretrial discovery documents in civil litigation when matters of public concern are at issue. Recently, the Supreme Court expanded the public's First Amendment right of access to criminal proceedings, and based on that, some lower courts have granted access to civil trials. In its decisions establishing…
Descriptors: Censorship, Civil Liberties, Constitutional Law, Court Litigation
Labov, William – 1981
The field methods for data collection in a research project on linguistic change and variation in the Philadelphia speech community, their origins and use, are described. Five working principles of the project are detailed: (1) there are no single style speakers; (2) styles can be ranged along a single dimension, according to the attention paid to…
Descriptors: Civil Liberties, Data Collection, Diachronic Linguistics, Field Studies
DeLay, Jeanine A. – 1987
An overview of six major issues in computer ethics is provided in this paper: (1) unauthorized and illegal database entry, surveillance and monitoring, and privacy issues; (2) piracy and intellectual property theft; (3) equity and equal access; (4) philosophical implications of artificial intelligence and computer rights; (5) social consequences…
Descriptors: Artificial Intelligence, Case Method (Teaching Technique), Case Studies, Computers
Pages: 1  |  ...  |  186  |  187  |  188  |  189  |  190  |  191  |  192  |  193  |  194  |  ...  |  227