NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)13
Audience
Policymakers1
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lapinski, P. Scott – Public Services Quarterly, 2012
One of the many challenges that content creators and repository administrators are both struggling with in this "born digital" information environment is the "ownership" of content. After several years of engaging directly with researchers across their campus and providing seminars on the National Institutes of Health (NIH) Public Access Policy,…
Descriptors: Certification, Copyrights, Information Policy, Contracts
Kaser, Dick – Computers in Libraries, 2009
According to the recent survey of Association of Learned and Professional Society Publishers (ALPSP), one of the several top trends in publishing nowadays is the licensing liberalization among publishers. Licensing options now abound and there are various price points for libraries considering new collections. One such example is how SAGE offers…
Descriptors: Certification, Library Services, Online Vendors, Information Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Ramsay, Judith; Renaud, Karen – Behaviour & Information Technology, 2012
One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…
Descriptors: Evidence, Electronic Mail, Interviews, Foreign Countries
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Carlson, Jon – Counseling and Values, 2010
From the standpoint of a former journal editor and long-time professional, this commentary challenges the direction of the profession as demonstrated in this special section. The ongoing creation of more and more ethical constraints not only harms the profession but also loses sight of fundamental ethical principles.
Descriptors: Policy Analysis, Barriers, Ethics, Decision Making
Gansler, Jacques S.; Gast, Alice P. – Chronicle of Higher Education, 2008
In the years since the September 11, 2001, terrorist attacks, the federal government's policies that deal with national security have changed significantly. In an effort to prevent the results of science and engineering research from being misused or falling into the wrong hands, government agencies that support studies are placing restrictions on…
Descriptors: Information Dissemination, Research Reports, Information Policy, Censorship
Bugeja, Michael J. – Education Digest: Essential Readings Condensed for Quick Review, 2008
An article this author wrote about avatar harassment and assault in Second Life (SL) inspired a considerable response after it was published. Perhaps the most notable reply was from Linden Lab, the company that created the virtual-reality world. In his initial essay ("The Chronicle of Higher Education," September 14, 2007; "The Education Digest,"…
Descriptors: Higher Education, Civil Rights, Computer Simulation, Technology Education
Peer reviewed Peer reviewed
Direct linkDirect link
Notley, Tanya – Youth Studies Australia, 2008
Most state governments in Australia have banned popular online networking sites from public schools after these sites were accused of supporting a broad host of threats to young people. This paper questions the effectiveness of these bans in light of recent empirical research that highlights the social and educational benefits that can accrue from…
Descriptors: Young Adults, Foreign Countries, Educational Opportunities, Information Networks
Seale, Jane; Abbott, Chris – International Journal of Research & Method in Education, 2007
This paper argues that if education practitioners, policy-makers and researchers are to gain insights from new forms of online self-representations, there is a need to take stock of research involving homepages in order to identify important methodological issues and lessons that need to be addressed in future research. Home page authorship…
Descriptors: Ethics, Classification, Research Methodology, Research Problems
Peer reviewed Peer reviewed
Direct linkDirect link
Sink, Christopher A. – Counseling and Values, 2010
From the standpoint of a journal editor and researcher, this commentary critically reflects on some of the primary notions addressed in the 4 featured articles of the special section, discussing areas of agreement and divergence. As a way of further exploring these ethical and professional concerns, the contentious issue of using school children…
Descriptors: Ethics, Graduate Study, Counselor Training, Children
Peer reviewed Peer reviewed
Direct linkDirect link
Dash, Leon – Qualitative Inquiry, 2007
The author opposes any Institutional Review Boards (IRBs) overseeing the work of journalism professors and journalism students in any academic institution. He argues that the tendency for IRBs to require anonymity for persons interviewed immediately reduces the credibility of any journalistic story. The composition of an IRB is questioned on…
Descriptors: Journalism Education, Constitutional Law, Social Sciences, Journalism
Windhausen, John, Jr. – EDUCAUSE, 2008
This white paper proposes bringing the federal government, state governments, and the private sector together as part of a new approach to making high-speed Internet services available across the country. It proposes the creation of a new federal Universal Broadband Fund (UBF) that, together with matching funds from the states and the private…
Descriptors: Private Sector, Telecommunications, Public Sector, Partnerships in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers