Publication Date
| In 2025 | 0 |
| Since 2024 | 113 |
| Since 2021 (last 5 years) | 508 |
| Since 2016 (last 10 years) | 1115 |
| Since 2006 (last 20 years) | 1914 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 89 |
| Teachers | 80 |
| Administrators | 77 |
| Researchers | 29 |
| Parents | 28 |
| Media Staff | 27 |
| Students | 23 |
| Counselors | 16 |
| Community | 5 |
| Support Staff | 4 |
| More ▼ | |
Location
| Canada | 77 |
| United States | 77 |
| Australia | 76 |
| California | 58 |
| United Kingdom | 58 |
| China | 27 |
| Pennsylvania | 27 |
| Turkey | 27 |
| Texas | 26 |
| Florida | 25 |
| North Carolina | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedWrightson, Denelle; Wrightson, John M. – Library Hi Tech, 1999
Discusses acoustical demands in public libraries to consider during the design and construction process of new or renovated library space. Topics include intrusive noises; overly reverberant spaces; lack of speech privacy; sound transmission class; noise criteria; reverberation time and noise reduction coefficient; space planning; sound systems;…
Descriptors: Acoustical Environment, Acoustics, Audio Equipment, Design Requirements
Peer reviewedKupritz, Virginia W. – Journal of Industrial Teacher Education, 2000
A survey of 120 administrators (59 aged 60+, 61 aged 35-50) found that both groups had similar perceptions of the association between office design and work activities. Older and younger workers ranked certain design features differently, and they had different perceptions of the privacy features of the work environment. (SK)
Descriptors: Employment Opportunities, Human Factors Engineering, Job Performance, Middle Aged Adults
Peer reviewedGorman, Michael – Information Technology and Libraries, 2001
Discusses technology and its effects on society and humans, particularly library and information technology. Highlights include the evolving history of technology; and values related to technology in libraries, including democracy, stewardship, service, intellectual freedom, privacy, literacy and learning, rationalism, and equity of access. (LRW)
Descriptors: Access to Information, Democracy, Information Technology, Intellectual Freedom
Smith, Sean W. – EDUCAUSE Quarterly, 2004
At Dartmouth College, the author teaches a course called "Security and Privacy." Its early position in the overall computer science curriculum means the course needs to be introductory, and the author can't assume the students possess an extensive computer science background. These constraints leave the author with a challenge: to construct…
Descriptors: Homework, Assignments, Privacy, Computer Security
Shih, Timothy; Hung, Jason – Information Science Publishing, 2007
Future Directions in Distance Learning and Communication Technologies presents theoretical studies and practical solutions for engineers, educational professionals, and graduate students in the research areas of e-learning, distance education, and instructional design. This book provides readers with cutting-edge solutions and research directions…
Descriptors: Electronic Learning, Distance Education, Instructional Design, Privacy
Kiker, Jason – Techniques: Connecting Education and Careers (J3), 2007
During the last few years, the development of seamless education systems to promote students' postsecondary success has been discussed by policymakers at the local, state and federal levels as well as reform-minded individuals. Florida, Washington, Iowa, Georgia and California either have statewide integrated systems or are moving quickly toward…
Descriptors: Educational Change, Educational Indicators, State Programs, Educational Policy
Walker, Karen – Education Partnerships, Inc., 2005
The Vernonia School District v. Acton Supreme Court decision in 1995, forever changed the landscape of the legality of drug testing in schools. This decision stated that students who were involved in athletic programs could be drug tested as long as the student's privacy was not invaded. According to some in the medical profession, there are two…
Descriptors: Addictive Behavior, Substance Abuse, Extracurricular Activities, Athletics
Petrova, Raina; Tibrewal, Abhilasha; Sobh, Tarek M. – Journal of STEM Education: Innovations and Research, 2006
In keeping with the outcome-based assessment outlined by ABET's Education Criteria 2000, the School of Engineering at the University of Bridgeport has defined fifteen general student outcomes for its computer engineering program. These outcomes form the basis of its instructional program and assessment activities. In assessing and monitoring the…
Descriptors: Engineering Education, STEM Education, Computer Science Education, Goal Orientation
Ahia, C. Emmanuel; Martin, Dan – 1993
A counselor's obligation to safeguard information shared in counseling has clinical, ethical, and legal implications. This volume focuses on the duty-to-warn exception in client confidentiality. It provides general ethical and legal guidelines and, where possible, specific information to help the practitioner make good choices. It is intended for…
Descriptors: Civil Law, Codes of Ethics, Confidential Records, Confidentiality
Hooker, Clifford P. – 1994
This paper addresses the legal tension between a teacher's right to privacy and a school board's right to demand exemplary conduct by teachers in and out of school. The watershed case in the area of a teacher's right to a private life appears to be "Morrison v. Board of Education" (California 1969), which identified factors that a board may…
Descriptors: Behavior Standards, Court Litigation, Elementary Secondary Education, Legal Problems
General Accounting Office, Washington, DC. – 1995
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Descriptors: Communications, Computer Networks, Computer Security, Confidentiality
Dagley, Dave; Veir, Carole A. – 1990
School district personnel files were traditionally considered private. Since the advent of federal and state open record acts, the private nature of personnel records has come into question. All court cases since 1966, in which a member of the public wanted access to public employee information and a personal privacy exemption was raised as a…
Descriptors: Case Records, Civil Liberties, Confidential Records, Court Litigation
Smith, Michael R. – Jail Law Bulletin, 1990
The U.S. Constitution guarantees a right to privacy that requires deputies and jailers to avoid the unnecessary disclosure of sensitive information about a person. This privacy right especially covers Acquired Immune Deficiency Syndrome-related (AIDS) information, and it even protects the immediate family of persons infected with human…
Descriptors: Acquired Immune Deficiency Syndrome, Communicable Diseases, Confidentiality, Correctional Institutions
Kerr, Stephen T. – 1983
This four-section paper begins with a brief description of videotex and the paths its development has followed during its short lifespan. The second section examines how videotex systems should present and display information, and how such information should be internally organized so that it is maximally useful for the reader/user. The analysis,…
Descriptors: Computer Graphics, Computer Science, Design Requirements, Display Systems
Gandy, Oscar H., Jr. – 1989
A study was conducted to develop some understanding of how social experience might be related to public expectations of rights to privacy. A telephone questionnaire was developed which sought information about respondent knowledge, attitudes, and behavior regarding privacy and personal information. A national survey of adults over the age of 18…
Descriptors: Analysis of Variance, Attitudes, Civil Liberties, Communication Research

Direct link
