NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)38
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 1 to 15 of 41 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Washington, Edwina Thomas – Adult Learning, 2015
Bullying is a social problem. The proliferation of electronic technology has provided a new forum for bullies to harm victims. That is, bullies can transmit harmful text messages, photos, or video over the Internet and other digital communication devices to victims. This malpractice of technology-oriented phenomenon known as cyberbullying has…
Descriptors: Higher Education, Bullying, Social Networks, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Reyman, Jessica – College English, 2013
Social web services catalog users' activities across the Internet, aggregating, analyzing, and selling a vast array of user data to be used largely for consumer profiling and target marketing. This article interrogates the tacit agreements and terms-of-use policies that govern who owns user data, how it circulates, and how it can be used. Relying…
Descriptors: Internet, Information Policy, Policy Analysis, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Illowsky, Barbara – MathAMATYC Educator, 2012
As the coauthor (with Susan Dean) of a formally for-profit and now open (i.e., free on the web) textbook, "Collaborative Statistics," this author has received many questions about open educational resources (OER), which can be summarized as follows: (1) What are OER?; (2) Why do you support, actively promote, and speak about OER?; (3) If a book is…
Descriptors: Educational Resources, Open Source Technology, Definitions, Program Descriptions
Peer reviewed Peer reviewed
Direct linkDirect link
Snowman, Ann Mackay – Journal of Access Services, 2013
Every U.S. state and the District of Columbia has a law on the books that protects a library borrower's privacy, both an ethical and legal obligation of the library. In addition, FERPA further restricts access to users' records. Getting the message across to staff can be a challenge, especially if you employ students or volunteers who may not…
Descriptors: Ethics, Library Services, Confidentiality, Staff Development
Office of Postsecondary Education, US Department of Education, 2012
The Technological Innovation and Cooperation for Foreign Information Access (TICFIA) Program supports projects focused on developing innovative technologies for accessing, collecting, organizing, preserving, and disseminating information from foreign sources to address the U.S.' teaching and research needs in international education and foreign…
Descriptors: Higher Education, Libraries, Innovation, Federal Aid
Peer reviewed Peer reviewed
Direct linkDirect link
Veltsos, Jennifer R. – Business Communication Quarterly, 2012
Forty-six states require organizations to notify users when personally identifiable information has been exposed or when the organization's data security measures have been breached. This article describes a qualitative document analysis of 13 data breach notification templates from state and federal agencies. The results confirm much of the…
Descriptors: Information Security, Compliance (Legal), Disclosure, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Peekhaus, Wilhelm – Government Information Quarterly, 2011
This paper examines the difficulties encountered by Biowatch, a South African civil society environmental organization, in its attempts to obtain access to government information in respect of genetically engineered plants. After establishing the context of South Africa's access to information regime, including a brief discussion of several of its…
Descriptors: Access to Information, Court Litigation, Foreign Countries, Constitutional Law
Petruniak, Mark; Krokosky, Alyson; Terry, Sharon F. – Exceptional Parent, 2011
This article discusses the Genetic Information Nondiscrimination Act (GINA) which President George W. Bush officially signed in 2008. The law prohibits employers from making adverse employment decisions based on a person's genetic information, including family health history. It also forbids insurance companies from discriminating against…
Descriptors: Health Services, Civil Rights, Genetics, Scientific and Technical Information
Peer reviewed Peer reviewed
Direct linkDirect link
Bradley, Loretta J.; Hendricks, Bret; Kabell, Douglas R. – Family Journal: Counseling and Therapy for Couples and Families, 2011
In an era of increased need and expectation for confidentiality, the counseling record of the deceased client challenges confidentiality. Using ethical codes and legal mandates, the authors explore whether the counseling record of a deceased client should be released when the client's will and the client's counseling records are silent on this…
Descriptors: Confidentiality, Ethics, Compliance (Legal), Legal Problems
Peer reviewed Peer reviewed
Direct linkDirect link
Walby, Kevin; Larsen, Mike – Qualitative Inquiry, 2012
Access to information (ATI) and freedom of information (FOI) mechanisms are now relevant features of governments in many liberal democracies today. Citizens, organizations, and permanent residents in several countries across the globe can request unpublished information from federal, provincial, state, county, and municipal government agencies.…
Descriptors: Qualitative Research, Freedom, Access to Information, Discourse Analysis
Griffths, David N. – Library Journal, 2010
Though some libraries thrived in 2009, many more took a beating, and the fiscal crises that have struck many states and thousands of municipal governments in 2010 increase the odds that the effects of the new Great Recession will be felt over the long term. The decline in payroll and collections budgets have led to a loss of expertise and key…
Descriptors: Access to Information, Public Policy, Information Services, Electronic Libraries
Malachowski, Margot – Computers in Libraries, 2011
Patient activation is a new term for a perennial problem. People know what they need to do for their health: exercise, eat right, and get enough rest--but how are they motivated to actually do these things? This is what patient activation is. From this author's vantage point as a medical librarian, public libraries are well-placed to be part of…
Descriptors: Public Libraries, Internet, Information Policy, Health Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
Jameson, Daphne A. – Business Communication Quarterly, 2011
When Starwood Hotels charged Hilton Hotels with industrial espionage, the case hinged on an employment agreement that two executives had violated. The rhetoric of the employment agreement contrasted greatly with that of the corporation's own code of business conduct. Whereas the private agreement stressed narrow self-interest, the public code…
Descriptors: Housing, Tourism, Business, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Valeri, Andy – Policy Futures in Education, 2012
This article outlines how providing accessible transparency to information controlled by institutions of power and suppressed from public view is both similar in purpose to, as well as an essential component of, the pedagogical processes promoted by Paulo Freire, which are necessary for the establishment of a truly just and non-oppressive society.…
Descriptors: Access to Information, Information Policy, Freedom of Speech, Censorship
Peer reviewed Peer reviewed
Direct linkDirect link
Ramsay, Judith; Renaud, Karen – Behaviour & Information Technology, 2012
One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…
Descriptors: Evidence, Electronic Mail, Interviews, Foreign Countries
Previous Page | Next Page ยป
Pages: 1  |  2  |  3