Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Software | 12 |
Electronic Mail | 12 |
Privacy | 12 |
Computer Security | 3 |
Ethics | 3 |
Guidelines | 3 |
Information Technology | 3 |
Internet | 3 |
Access to Information | 2 |
Computer Networks | 2 |
Confidentiality | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
EDUCAUSE Quarterly | 1 |
Journal of Government… | 1 |
Library Hi Tech | 1 |
Library Journal | 1 |
Microcomputers for… | 1 |
Online | 1 |
Phi Delta Kappan | 1 |
Author
Amidon, Paige | 1 |
Bialo, Ellen R. | 1 |
Britz, J. J. | 1 |
Filmer, Paul E. | 1 |
Gil-Garcia, J. Ramon | 1 |
Giovanni Bryan Jamal McKinney | 1 |
McCollum, Roy | 1 |
Miller, Jerry P. | 1 |
Miller, Mary G. | 1 |
Quinn-Lee, Lisa | 1 |
Rogers, Rodney O. | 1 |
More ▼ |
Publication Type
Education Level
Audience
Community | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Minnesota | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Quinn-Lee, Lisa – ProQuest LLC, 2009
A review of the literature reveals few articles that deal with social work with grieving children in the public school setting. The purpose of this research is to describe and analyze the services that school social workers provide to grieving children. Grieving children are defined as those who have experienced loss through death of someone…
Descriptors: Siblings, Parents, Grandparents, Friendship
Van Horn, Royal – Phi Delta Kappan, 2000
Peeping software takes several forms and can be used on a network or to monitor a certain computer. E-Mail Plus, for example, hides inside a computer and sends exact copies of incoming or outgoing e-mail anywhere. School staff with monitored computers should demand e-mail privacy. (MLH)
Descriptors: Computer Software, Electronic Mail, Elementary Secondary Education, Internet

Filmer, Paul E. – Library Hi Tech, 1995
Addresses concerns associated with the evolving National Information Infrastructure, including navigation; electronic bulletin board arrangements, including kiosks or sandboxes; electronic journals and electronic publishing; copyright issues, including liability issues associated with software or downloaded data; privacy rights; and collaboration…
Descriptors: Computer Software, Copyrights, Downloading, Electronic Journals
Amidon, Paige – Online, 1992
Discusses privacy concerns relating to electronic information media. European privacy initiatives from the European Community are described, including personal data protection, impact on the online industry, and telecommunications privacy; and activities in the United States are examined, including telephone caller privacy, electronic mail…
Descriptors: Computer Software, Confidential Records, Electronic Mail, Foreign Countries
Miller, Jerry P. – Library Journal, 1994
Describes results of a survey of librarians conducted using the Internet, regarding their attitudes toward electronic mail and networking. Topics addressed include software; the effect on job descriptions; privacy issues; use in academic libraries; navigation problems; discussion groups; and perceived value. A sidebar discusses network etiquette.…
Descriptors: Academic Libraries, Computer Software, Electronic Mail, Higher Education
Ruberg, Laurie F.; Miller, Mary G. – 1993
The increasing use of computer technology for sending and receiving electronic mail messages not only signifies changes in how we communicate, but also signals changes in the skills, knowledge, and practices associated with communication by mail. Some of the characteristics of electronic mail (e-mail) are considered. E-mail refers to the capacity…
Descriptors: Computer Software, Cost Effectiveness, Electronic Equipment, Electronic Mail
Britz, J. J. – Microcomputers for Information Management, 1996
Assesses the impact of technology on privacy. Discusses electronic monitoring of people in the workplace; interception and reading of e-mail messages; merging of databases which contain personal information; rise in the number of hackers; and the development of software that makes the decoding of digital information virtually impossible. Presents…
Descriptors: Access to Information, Computer Software, Confidentiality, Databases
Sivin, Jay P.; Bialo, Ellen R. – 1992
In response to the rapid growth of computer crime and such illegitimate practices as piracy and fraud, the National Institute of Justice and the Office for Educational Research and Improvement have formed a partnership to promote school programs on the ethical uses of new technologies. This report, the first of the partnership, is designed to…
Descriptors: Computer Software, Curriculum Development, Educational Technology, Electronic Mail
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Waterhouse, Shirley; Rogers, Rodney O. – EDUCAUSE Quarterly, 2004
Most professionals interested in the use of technology in education understand the importance of an e-learning course site, whether the course is taught totally online or in a hybrid environment where the instructor has some face-to-face contact with students. However, many instructors have not thoroughly considered the importance of posting…
Descriptors: Copyrights, Online Courses, Privacy, Educational Technology