Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 41 |
Since 2006 (last 20 years) | 169 |
Descriptor
Access to Information | 368 |
Information Policy | 368 |
Internet | 120 |
Information Technology | 81 |
Foreign Countries | 71 |
Information Management | 65 |
Privacy | 65 |
Public Policy | 52 |
Information Dissemination | 51 |
Copyrights | 48 |
Elementary Secondary Education | 40 |
More ▼ |
Source
Author
Publication Type
Education Level
Audience
Practitioners | 17 |
Policymakers | 15 |
Media Staff | 11 |
Teachers | 7 |
Administrators | 5 |
Parents | 2 |
Researchers | 2 |
Counselors | 1 |
Students | 1 |
Location
United States | 25 |
Canada | 18 |
United Kingdom | 12 |
Australia | 9 |
California | 4 |
European Union | 4 |
Netherlands | 4 |
Connecticut | 3 |
Finland | 3 |
Florida | 3 |
France | 3 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Sequential Tests of… | 1 |
What Works Clearinghouse Rating
Zhu, Xiaohua; Eschenfelder, Kristin R. – College & Research Libraries, 2010
This paper analyzes changes to the definitions of "authorized users" contained in electronic resources licenses and embedded in access control technologies from the mid-1990s to the present. In analyzing changes to the license and technology-based definitions, it tracks shifts in major stakeholders' perceptions of authorized users and…
Descriptors: Electronic Publishing, Electronic Journals, Electronic Libraries, Access to Information
Mandel, Lauren H.; Bishop, Bradley Wade; McClure, Charles R.; Bertot, John Carlo; Jaeger, Paul T. – Government Information Quarterly, 2010
U.S. public libraries provide free public internet services to the communities that they serve, but require robust, high-speed broadband internet connections to continue meeting public demands. The 2008-2009 "Public Library Funding & Technology Access Study" ("PLFTAS") illustrates challenges that public libraries encounter in achieving broadband…
Descriptors: Research Needs, Public Libraries, Telecommunications, Internet
Thur, Victoria L. – Journal of Access Services, 2009
The U.S. government has sought to restrict the freedoms of its citizens in times of war from World War I to the present. The banners of fear, war, terrorism, and nationwide security placed constitutional rights under a renewed scrutiny. This paper will focus on the passage of laws that restrict academic and intellectual freedoms during war, and…
Descriptors: Intellectual Freedom, Access to Information, National Security, Academic Freedom
Ribera, Mireia; Porras, Merce; Boldu, Marc; Termens, Miquel; Sule, Andreu; Paris, Pilar – Program: Electronic Library and Information Systems, 2009
Purpose: The purpose of this paper is to explain the changes in the Web Content Accessibility Guidelines (WCAG) 2.0 compared with WCAG 1.0 within the context of its historical development. Design/methodology/approach: In order to compare WCAG 2.0 with WCAG 1.0 a diachronic analysis of the evolution of these standards is done. Known authors and…
Descriptors: Guidelines, Internet, Access to Information, Web Sites
Rampell, Catherine – Chronicle of Higher Education, 2008
The high prices of textbooks, which are approaching $1,000 per year for an average student, have those students and their professors crying for mercy. Flat World Knowledge, a new digital-textbook publisher, has the answer to this problem. Starting next year, the publisher will offer online, peer-reviewed, interactive, user-editable textbooks, free…
Descriptors: Textbook Publication, Electronic Publishing, Access to Information, Information Policy
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Schuck, Sandy; Aubusson, Peter; Kearney, Matthew – Contemporary Issues in Technology and Teacher Education (CITE Journal), 2010
The paper discusses the implications of the current phenomenon of adolescent engagement in digital spaces. Young people are increasingly active Web 2.0 users, and their interactions through these technologies are altering their social identities, styles of learning, and exchanges with others around the world. The paper argues for more research to…
Descriptors: Ethnography, Adolescents, Classroom Environment, Adolescent Attitudes
Parry, Marc – Chronicle of Higher Education, 2009
As the federal government prepares to pour billions of stimulus dollars into increased broadband Internet access, colleges are trying to claim much of the money and shape the emerging national networking policy. Their focus is $4.7-billion that will be doled out under a new grant program administered by a small Commerce Department agency called…
Descriptors: Access to Information, Telecommunications, Internet, Grants
Foster, Andrea L. – Chronicle of Higher Education, 2008
The University of Iowa has reversed course on a plan to make some students' theses freely available online, following protests from students in the university's writing programs. The students said the plan could have threatened the potential commercial value of their novels, plays, and other creative works. The controversy began in late winter,…
Descriptors: Graduate Students, Copyrights, Degree Requirements, Writing (Composition)
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…
Descriptors: Copyrights, Competition, Privacy, Free Enterprise System
British Columbia Ministry of Education, 2014
This handbook outlines procedures for sharing student data between schools and the Ministry of Education, and answers questions pertaining to provincial examinations. It supports the work of both educators and the Ministry, which works with schools to produce transcripts and administer provincial exams. The following are appended: (1) Forms; and…
Descriptors: Student Records, Access to Information, Disclosure, Information Dissemination
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Melvin, Valerie C. – US Government Accountability Office, 2010
Federal agencies are increasingly using electronic means to create, exchange, and store information, and in doing so, they frequently create federal records: that is, information, in whatever form, that documents government functions, activities, decisions, and other important transactions. As the volume of electronic information grows, so does…
Descriptors: Information Management, Electronic Publishing, Administrator Responsibility, Government Publications
Garbutt, Ruth – Disability & Society, 2009
This article addresses some of the difficulties inherent in disseminating emancipatory research findings in academic journals in a way that is empowering to people with learning difficulties in the UK. It calls for academics to challenge the editorial criteria of academic journals to consider accepting articles written in a more accessible style.…
Descriptors: Learning Problems, Mental Retardation, Access to Information, Journal Articles
Lewis, Stuart; Hayes, Leonie; Newton-Wade, Vanessa; Corfield, Antony; Davis, Richard; Donohue, Tim; Wilson, Scott – Program: Electronic Library and Information Systems, 2009
Purpose: The purpose of this paper is to describe the repository deposit protocol, Simple Web-service Offering Repository Deposit (SWORD), its development iteration, and some of its potential use cases. In addition, seven case studies of institutional use of SWORD are provided. Design/methodology/approach: The paper describes the recent…
Descriptors: Case Studies, Standards, Web Sites, Information Policy