NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 3,076 to 3,090 of 3,401 results Save | Export
Peer reviewed Peer reviewed
Curran, Robert – CUPA Journal, 1988
The problem with privacy and computers is not technology but lack of systematic value education in those who use, teach, and learn about computers. A deeper issue than updating the law to the age of computers is integrating computers and the right to privacy into the world of education. (MSE)
Descriptors: College Administration, Computer Uses in Education, Confidential Records, Ethics
Peer reviewed Peer reviewed
Hess, Diana – Update on Law-Related Education, 1989
Provides a moot court activity in which secondary students re-enact the U.S. Supreme Court case "California v. Greenwood," concerning the exclusionary rule and the privacy of a citizen's trash. Students role-play Supreme Court justices and attorneys to gain an understanding of how appellate courts operate. (LS)
Descriptors: Civil Liberties, Civil Rights, Class Activities, Constitutional Law
Peer reviewed Peer reviewed
Larson, Reed – Journal of Youth and Adolescence, 1995
The functions of solitary media use in the daily emotional lives of adolescents are discussed, suggesting that solitary television watching and music listening give adolescents an opportunity to explore and cultivate a newly discovered private self. Solitary media experiences provide an important context for dealing with stress and negative…
Descriptors: Adolescent Development, Adolescents, Coping, Developmental Stages
Peer reviewed Peer reviewed
Mitterer, John; O'Neill, Kevin – Interchange, 1992
Describes how the growing pervasiveness of computers and telecommunications influences knowledge and idea exchanges required by democracies for survival. Technology makes it possible to abuse an underdeveloped popular epistemology by influencing mechanisms of publicity and privacy. Challenges presented by technology, and the university's role in…
Descriptors: Censorship, Civil Liberties, College Role, Computers
Ebbinghouse, Carol – Searcher, 1999
Discusses problems for information professionals arising from traditional copyright legislation, as well as from the proposed Uniform Commercial Code 2B on information licensing. Highlights include responsibility of information consumers; World Wide Web terms and conditions, including those of newspapers and publishers; privacy issues; database…
Descriptors: Computer Software, Contracts, Copyrights, Databases
Peer reviewed Peer reviewed
Update on Law-Related Education, 1998
Presents a lesson plan to help students explore the rights of free expression and privacy, copyright laws, and forms of Internet communication; asks students to evaluate possible uses of the Internet based on these explorations. Includes a background statement, list of objectives, outline of procedures, and a student handout. (DSK)
Descriptors: Civics, Communications, Computer Uses in Education, Copyrights
Earls, Alan R. – Connection: New England's Journal of Higher Education and Economic Development, 2000
Explores privacy issues raised by information technology at colleges and universities. Drawing on accounts and opinions of faculty and staff members, provides examples of current practices and policies on Internet and e-mail use and discusses the possible need for more developed policies. (EV)
Descriptors: Access to Information, College Environment, Colleges, Confidentiality
Dowling-Sendor, Benjamin – American School Board Journal, 2000
In a case involving questionable canine search-and-seizure practices, a circuit court upheld a school board's decision to terminate a teacher's contract. While touting zero tolerance, the board fired an honored teacher 3 years from retirement who may not have known about the marijuana cigarette in her car. (MLH)
Descriptors: Court Litigation, Drug Use Testing, Elementary Secondary Education, Marijuana
Machovec, George S. – Online Libraries and Microcomputers, 1998
Presents guidelines for statistics for Web-based information resources developed by the International Coalition of Library Consortia (ICOLC). Outlines use elements that must be provided: number of queries, menu selections, sessions, turn-aways, and items examined. Discusses privacy; user, institutional, and consortial confidentiality;…
Descriptors: Access to Information, Comparative Analysis, Confidentiality, Consortia
Mawdsley, Ralph D.; Russo, Charles J. – School Business Affairs, 2001
Reviews recent federal appellate court cases dealing with legal issues involving random drug testing of students participating in extracurricular activities. Draws implications for school business officials and other educators. (PKP)
Descriptors: Board of Education Policy, Constitutional Law, Court Litigation, Drug Use Testing
Peer reviewed Peer reviewed
Direct linkDirect link
Repo-Tiihonen, Eila; Vuorio, Osmo; Koivisto, Hanna; Paavola, Paula; Hakola, Panu – Journal of Offender Rehabilitation, 2004
Patient satisfaction studies concerning various treatment modalities are few among involuntary forensic psychiatric treatment. They indicate general satisfaction with medication, interactive treatment and occupational therapy but dissatisfaction with lack of privacy, insufficiently explained rules and inadequately explained reasons of seclusion.…
Descriptors: Nurses, Psychiatric Hospitals, Patients, Foreign Countries
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
McBain, Lesley – American Association of State Colleges and Universities, 2008
The complex issues of promoting student mental health, privacy and public safety, and the balance among them, weigh on the minds of institutional leaders, educational policymakers, and local, state and federal officials. American campuses have a proud history of intellectual freedom, openness and public accessibility to their communities. However,…
Descriptors: Privacy, School Security, Safety, Mental Health
Peer reviewed Peer reviewed
Direct linkDirect link
Alexander, Bryan – Theory Into Practice, 2008
Students are, increasingly, digital content producers, and participate extensively in evolving online social networks. The emergence of the former represents subtle changes in students' experience of images, audience, copyright, ownership of learning, and technology. Experiencing the latter places students in an awkward position in terms of…
Descriptors: Intellectual Property, Educational Technology, Visual Environment, Social Networks
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Pages: 1  |  ...  |  202  |  203  |  204  |  205  |  206  |  207  |  208  |  209  |  210  |  ...  |  227