Publication Date
| In 2026 | 0 |
| Since 2025 | 182 |
| Since 2022 (last 5 years) | 615 |
| Since 2017 (last 10 years) | 1244 |
| Since 2007 (last 20 years) | 2119 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| Australia | 80 |
| United States | 80 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 28 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Garfinkel, Simson L. – Technology Review, 1998
The World Wide Web Consortium--an organization based at the Massachusetts Institute of Technology (MIT) that has 275 corporate members and holds closed meetings--is the closest thing the Web has to a central authority; however, almost nobody outside the telecommunications industry understands what the consortium is. Analyzes the role this body may…
Descriptors: Consortia, Futures (of Society), Governing Boards, Guidelines
Peer reviewedGorman, Michael – Australian Library Journal, 1999
Lists values that should underpin librarians' work: stewardship, service, intellectual freedom, privacy, rationalism, commitment to literacy and learning, unfettered access to recorded knowledge and information, and democracy. Discusses how these values should be used to shape a vision of the future library, a "library as a place" that challenges…
Descriptors: Access to Information, Electronic Libraries, Futures (of Society), Information Scientists
Peer reviewedTwidale, Michael B.; Nichols, David M. – Annual Review of Information Science and Technology (ARIST), 1998
Considers how research in collaborative technologies can inform research and development in library and information science. Topics include computer supported collaborative work; shared drawing; collaborative writing; MUDs; MOOs; workflow; World Wide Web; collaborative learning; computer mediated communication; ethnography; evaluation; remote…
Descriptors: Cooperation, Electronic Libraries, Ethnography, Evaluation Methods
Peer reviewedGattiker, Urs E.; Perlusz, Stefano; Bohmann, Kristoffer – Internet Research, 2000
Illustrates some of the challenges that electronic commerce practitioners and researchers face, focusing on business to business (B2B) transactions. Highlights include a conceptual framework of Web user behavior; purchasing context; socio-demographic characteristics; cultural factors; economic factors; attitudes toward information technology;…
Descriptors: Computer Attitudes, Computer Security, Cultural Influences, Demography
Rhinehart, Paul T. – CAUSE/EFFECT, 1996
When used in managing college student records, electronic data interchange allows electronic student records to be fed directly into a receiving institution's database instead of being sent by mail. Although the process offers many clear advantages, one important question that must be addressed is how students' privacy will be protected under a…
Descriptors: College Administration, College Students, Confidential Records, Databases
Brown, Valerie L. – West's Education Law Quarterly, 1996
Addresses the question of institutional duty of care in college sports. Asks if the Supreme Court's decision in "Vernonia," which held that random, suspicionless urinalysis testing of student-athletes is allowed, gives college officials a free hand in conducting random, suspicionless searches for college athletes and nonathletes alike.…
Descriptors: Athletes, College Athletics, Court Litigation, Drug Use Testing
Zirkel, Perry A. – Phi Delta Kappan, 2000
Regarding Catholic parents' suit against a suburban New York district for promoting occult activities, a federal court ruled in May 1999 that parents had failed to prove existence of the so- called Bedford program. This Solomon-like ruling also rejected First Amendment religious claims and 14th Amendment privacy claims. (MLH)
Descriptors: Catholics, Controversial Issues (Course Content), Court Litigation, Elementary Education
Peer reviewedCottrell, Janet R. – Library Hi Tech, 1999
This article reviews the literature to examine whether new technologies have created new ethical dilemmas in librarianship. Four possible areas of concern are identified: privacy and confidentiality, acquisitions and collection development, archiving and preservation, and deskilling and gender bias. (Author/LRW)
Descriptors: Archives, Ethics, Gender Issues, Information Technology
Yang, Julia A.; Kombarakaran, Francis A. – Health & Social Work, 2006
The established professional practice requiring informed consent for the disclosure of personal health information with its implied right to privacy suffered a serious setback with the first federal privacy initiative of the Bush administration. The new Health Insurance Portability and Accountability Act (HIPAA) of 1996 (P.L. 104-191) privacy…
Descriptors: Disclosure, Federal Legislation, Privacy, Health Services
Eckes, Suzanne; McCarthy, Martha – Journal of Women in Educational Leadership, 2004
This article addresses the Supreme Court's 2003 decision in "Lawrence v. Texas" and its implications for the rights of gay and lesbian public school teachers. The authors provide a context by reviewing the teacher role-model theory, traditional standards used in dismissals for immoral conduct, and pre-"Lawrence" cases regarding…
Descriptors: Public Schools, Public School Teachers, Teacher Role, Privacy
Van Manen, Max; Levering, Bas – 1996
The prevailing view of secrets as undesirable or unhealthy is challenged in this exploration of the meaning and significance of secrecy. As a crucial dimension of human development, secrets lead to a child's awareness of inner space and external worlds. This in turn leads to the development of a sense of self, personal responsibility, autonomy,…
Descriptors: Child Behavior, Child Caregivers, Child Development, Child Psychology
Gold, Skye R.; Derevenco, Maria R. – 1996
As the AIDS epidemic grows, society is faced by a growing number of children who are born HIV infected. Unfortunately, little systematic research has been conducted which addresses the psychological and social ramifications of HIV status disclosure to children. While most parents prefer not to inform the child of the illness, most clinicians favor…
Descriptors: Acquired Immune Deficiency Syndrome, Children, Childrens Rights, Confidentiality
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography
Denning, Dorothy E., Ed.; Lin, Herbert S., Ed. – 1994
This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services,…
Descriptors: Access to Information, Censorship, Computer Networks, Confidentiality
Garson, G. David – 1995
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Descriptors: Case Studies, Civil Liberties, Computer Security, Computers

Direct link
