NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 31 to 45 of 616 results Save | Export
Schmidt, Peter – Chronicle of Higher Education, 2012
The author reports on a legal battle over oral-history records housed at Boston College that casts light on how little legal weight pledges of confidentiality to research subjects actually have. As a federal court weighs whether to let the federal government seize, and hand over to British authorities, the college's records of confidential…
Descriptors: Academic Freedom, Confidentiality, Court Litigation, Foreign Countries
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Levinson-Waldman, Rachel; O'Neil, Robert – Trusteeship, 2012
In an era of demands for greater accountability in higher education, an increasingly polarized political environment, and scandals such as that at Penn State, access to information is becoming everyone's business, affecting public and independent institutions alike. Although Freedom of Information Act (FOIA) demands are often annoying or…
Descriptors: Higher Education, Access to Information, Governance, Governing Boards
Steketee, Amy M. – District Administration, 2012
The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education…
Descriptors: School Security, School Districts, School Administration, Central Office Administrators
Peer reviewed Peer reviewed
Direct linkDirect link
Davidov, Danielle M.; Nadorff, Michael R.; Jack, Susan M.; Coben, Jeffrey H. – Journal of Interpersonal Violence, 2012
In the United States, there is an ongoing debate about requiring health care professionals to report intimate partner violence (IPV) to law enforcement agencies. A comprehensive examination of the perspectives of those required to report abuse is critical, as their roles as mandated reporters often pose legal, practical, moral, and ethical…
Descriptors: Nurses, Home Visits, Attitudes, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Veltsos, Jennifer R. – Business Communication Quarterly, 2012
Forty-six states require organizations to notify users when personally identifiable information has been exposed or when the organization's data security measures have been breached. This article describes a qualitative document analysis of 13 data breach notification templates from state and federal agencies. The results confirm much of the…
Descriptors: Information Security, Compliance (Legal), Disclosure, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Çelik, Sabri – Education, 2011
This study, which is aimed at revealing the opinions of teachers who work at primary schools with regards to the personnel record report prepared by school principals, was conducted at the primary schools in the central district, Yenimahalle, in the city of Ankara. The study was performed during the academic year 2010-2011 with 171 randomly…
Descriptors: Foreign Countries, Elementary School Teachers, Teacher Attitudes, Opinions
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stephan, Karl D. – American Journal of Engineering Education, 2012
Authority as a philosophical concept is defined both in general and as it applies to engineering education. Authority is shown to be a good and necessary part of social structures, in contrast to some cultural trends that regard it as an unnecessary and outmoded evil. Technical, educational, and organizational authority in their normal functions…
Descriptors: Engineering Education, Power Structure, Philosophy, Teacher Role
Baird, Aaron – ProQuest LLC, 2012
A long tradition of adoption of innovations research in the information systems context suggests that innovative information systems are typically adopted by the largest companies, with the most slack resources and the most management support within competitive markets. Additionally, five behavioral characteristics (relative advantage,…
Descriptors: Information Systems, Technology Integration, Innovation, Consumer Economics
Peer reviewed Peer reviewed
Direct linkDirect link
Hew, Khe Foon; Cheung, Wing Sum – Asia Pacific Journal of Education, 2012
Facebook has become one of the most popular social network sites among many students. However, current research on Facebook use has focused mainly on Anglo-American students. Relatively little is known about Facebook use in Singapore. Data were collected from 83 students (ages ranged from 15 to 23). This study uses a naturalistic case study…
Descriptors: Foreign Countries, Social Networks, Web Sites, Role
Peer reviewed Peer reviewed
Direct linkDirect link
Bradley, Loretta J.; Hendricks, Bret; Kabell, Douglas R. – Family Journal: Counseling and Therapy for Couples and Families, 2011
In an era of increased need and expectation for confidentiality, the counseling record of the deceased client challenges confidentiality. Using ethical codes and legal mandates, the authors explore whether the counseling record of a deceased client should be released when the client's will and the client's counseling records are silent on this…
Descriptors: Confidentiality, Ethics, Compliance (Legal), Legal Problems
Data Quality Campaign, 2011
The education sector is beginning to embrace a culture that values, demands and uses data to support improved decisionmaking at every level--in classrooms, at kitchen tables and in state capitols. This shift is due in large part to state policymakers' leadership over the last six years in building statewide longitudinal data systems that collect…
Descriptors: Information Security, Privacy, Student Records, Confidential Records
Peer reviewed Peer reviewed
Direct linkDirect link
Hanafin, Joan; O'Donoghue, Tom; Flynn, Marie; Shevlin, Michael – Educational Studies, 2010
Privacy has been defined as "the protective buffer within which people can avoid another party's taking something from them, keeping watch over them, or entering into their lives in a way that is both unwelcome and undesirable". It is a premise of this paper that such a position needs to be taken very seriously in contemporary society,…
Descriptors: Educational Practices, Elementary Education, Privacy, Childrens Rights
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  42