Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Author
Rizzo, Claudia | 2 |
Simpson, Carol Mann | 2 |
Treadwell, Mark | 2 |
Armstrong, Jane | 1 |
Barrett, G. Jaia, Ed. | 1 |
Baule, Steven M. | 1 |
Bergner, Terry | 1 |
Bielefield, Arlene | 1 |
Cate, Fred H. | 1 |
Cheeseman, Lawrence | 1 |
Conn, Kathleen | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 2 |
Audience
Practitioners | 46 |
Media Staff | 16 |
Teachers | 16 |
Administrators | 11 |
Students | 4 |
Researchers | 3 |
Policymakers | 2 |
Community | 1 |
Parents | 1 |
Location
Canada | 4 |
New York | 1 |
Pennsylvania | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
First Amendment | 2 |
Hazelwood School District v… | 1 |
Individuals with Disabilities… | 1 |
Privacy Act 1974 | 1 |
Rehabilitation Act 1973 | 1 |
United States Constitution | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines

PS: Political Science and Politics, 1997
Outlines 10 basic principles for managing intellectual property in a digital environment. Expands upon each principle and provides specific examples of how and where these principles might be applied. Briefly discusses the history of electronic documentation, recent changes, and how these impact on the world of scholarly communication. (MJP)
Descriptors: Access to Information, Computer Software, Computer Uses in Education, Copyrights
Edwards, B. T. – 1995
This program examines the changing relationship between the military and the press. In this episode leading journalists and military public affairs officials debate uses of censorship, access to the battlefield, and the impact of live television on military operations. The study guide offers questions to use before viewing the video, questions to…
Descriptors: Censorship, Freedom, Higher Education, Information Dissemination
Coyle, Karen – 1997
This book provides a selection of documentary background information on areas of the Information Highway debate that are particularly relevant to libraries. The book is designed for librarians who are online but have little time to explore the general areas of information policy, and for those not yet connected to the Internet who need to…
Descriptors: Access to Information, Background, Censorship, Copyrights
Rizzo, Claudia – 1994
This program examines the series of myths generated by the media about war, peace, and the use of force. This episode explores the emergence of the popular interpretation of violence by "good" citizens who use violence to produce positive results during wartime. The study guide offers questions to use before viewing the video, questions to follow…
Descriptors: Censorship, Freedom, Higher Education, Information Dissemination
Alberta Dept. of Education, Edmonton. – 1999
The information in this document is based on a study that Alberta Education commissioned on establishing technology systems that are responsive to the requirements of Alberta's Freedom of Information and Protection of Privacy Act (FOIPP). This document provides an overview of key issues and suggested strategies in the following areas: (1)…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Educational Administration
Baule, Steven M. – 1997
Planning for the instructional use of technology within a modern and progressive school system is extremely complex because of the speed at which technology is advancing. The identification of strategic goals and objectives and an evolving rough map of how to achieve those goals has replaced the traditional strategic planning process. This book…
Descriptors: Computer Uses in Education, Cooperative Planning, Educational Cooperation, Educational Finance
American Library Association, Chicago, IL. Office of Intellectual Freedom. – 1996
This manual is designed to help librarians anticipate and resist censorship of library materials, how to handle complaints, and how to write legislators effectively. Part I, "Library Bill of Rights," and Part II, "Protecting the Freedom to Read," present the text and historical development of the American Library Association's…
Descriptors: Access to Information, Accessibility (for Disabled), Activism, Censorship
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education
New York Library Association, New York. – 1995
This manual advises library administrators in the state of New York on the responsibilities of individual institutions regarding censorship, patron confidentiality, and other intellectual freedom issues. Besides listing organizations available for consultation, the manual recommends procedures and policies for dealing with law enforcement…
Descriptors: Academic Libraries, Access to Information, Censorship, Confidentiality
Simpson, Carol Mann – 1997
This monograph presents examples of typical public school situations involving copyright issues and gives practical advice that is based on a conservative interpretation of the copyright law. One new feature of this second edition is fair use guidelines for multimedia materials. Chapter topics include: (1) history and liability; (2) fair use; (3)…
Descriptors: Administrators, Audiovisual Aids, Computer Software, Copyrights
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software
Bielefield, Arlene; Cheeseman, Lawrence – 1997
This book provides librarians, researchers, and teachers with a comprehensive guide to technology and copyright issues, and is written for non-lawyers. Part 1 summarizes the historical and legal background and looks at future trends, including the probable effects of recommendations from the National Information Infrastructure report. Part 2…
Descriptors: Access to Information, Computer Software, Contracts, Copyrights
McKenna, Mary – 1994
The Internet is an international computer network encompassing thousands of smaller interconnected networks. This digest describes various uses of the Internet and its impact on libraries, as well as Internet-related library issues. The Internet applications of electronic mail (E-mail), telnet, and file transfer protocol (FTP) are briefly…
Descriptors: Academic Libraries, Electronic Mail, Elementary Secondary Education, File Transfer Protocol
Kibirige, Harry M. – 1996
Information has become an increasingly valuable commodity. Access to full-text information, containing text, images, and in some cases, sound, is becoming vital to decision-making for organizations as well as individuals. The book covers the following topics: (1) the information marketplace in a cyberculture; (2) the telecommunications foundation…
Descriptors: Access to Information, Computer Interfaces, Computer Literacy, Computer Mediated Communication