Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Author
Atkinson, Robert D. | 2 |
Entman, Robert M. | 2 |
AL Faresi, Ahmed | 1 |
Aldrich, Duncan | 1 |
Conn, Kathleen | 1 |
Emmans, Cindy | 1 |
Gavitt, Donna R. | 1 |
Glasser, Mike | 1 |
Hassler, Ardoth A. | 1 |
Higginbotham, Julie S. | 1 |
Hodges, Marjorie W. | 1 |
More ▼ |
Publication Type
Education Level
Elementary Secondary Education | 1 |
Location
Canada | 1 |
United States | 1 |
Laws, Policies, & Programs
First Amendment | 3 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Consortium for School Networking (NJ1), 2011
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Descriptors: Safety, Laws, School Districts, Internet
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…
Descriptors: Copyrights, Competition, Privacy, Free Enterprise System
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Ross, Virginia Watson – ProQuest LLC, 2010
Cloud computing is a growing field, addressing the market need for access to computing resources to meet organizational computing requirements. The purpose of this research is to evaluate the factors that influence an organization in their decision whether to adopt cloud computing as a part of their strategic information technology planning.…
Descriptors: Technology Planning, Information Technology, Internet, Strategic Planning
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Kleeman, Michael J. – 1999
The goals of the Fourth Annual Aspen Institute Roundtable on International Telecommunications were: to address procedural and substantive solutions for international coordination of Internet policy issues; to suggest different models for dispute resolution and policy coordination that might be employed in the various contexts of Internet usage;…
Descriptors: Access to Information, Foreign Countries, Information Policy, Intellectual Property
Entman, Robert M.; Katz, Michael L. – 2001
The Aspen Institute's Communications and Society Program convened leaders and experts in the telecommunications and related fields to address telecommunications regulation in an IP (Internet Protocols) environment at the 15th annual Aspen Institute Telecommunications Policy Conference (Aspen, Colorado, August 12-16, 2000). The report from this…
Descriptors: Change, Conferences, Information Dissemination, Information Policy
Higginbotham, Julie S. – School Planning and Management, 1996
Acceptable-use policies help ensure appropriate Internet access in a New York State school district. The district's four elementary schools and one each junior high and high school are relying on a two-pronged strategy. A policy version for staff, and one for students and parents, couples tight supervision with a carefully crafted acceptable-use…
Descriptors: Board of Education Policy, Elementary Secondary Education, Information Policy, Internet
Hope, Barbara; Mattingly, Maribeth; Spear, Eric; Glasser, Mike – 1999
The University of Maryland, College Park recognized in the 1990s that its institutional data was an asset that needed to be managed. In this Information Age, data must be turned into knowledge quickly and accurately. The University of Maryland implemented a campus data warehouse, and along with it a comprehensive meta data platform for helping…
Descriptors: Copyrights, Fair Use (Copyrights), Higher Education, Information Networks

Ritter, Jeffrey – International Information & Library Review, 1997
The global dimension of the Internet requires new approaches to formulating policy infrastructures. Commerce must invest in the development of policy infrastructures and governments must support these new approaches; an effective balance between commercial needs and social requirements is necessary in order to achieve universal access. The…
Descriptors: Access to Information, Global Approach, Government Role, Information Policy

Perks, Dennis J.; Gavitt, Donna R.; Olivo, John J. – Computers & Education, 1997
Developing an Internet acceptable use policy is the first step in bringing technological change to the classroom. This article defines educator's proactive responsibilities and provides a policy shell (privilege, "netiquette," security, vandalism, legal issues, warranties, and user agreements) to formulate individual school policies.…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Guidelines
2000
In October, 1998, Congress enacted the Child Online Protection Act and established the Commission on Online Child Protection (COPA) to study methods to help reduce access by minors to certain sexually explicit material, defined in the statute as harmful to minors. Congress directed the Commission to evaluate the accessibility, cost, and…
Descriptors: Access to Information, Child Safety, Children, Federal Legislation
2000
The appendices for the Commission on Child Online Protection (COPA) Report to Congress, October 20, 2000, include the following: Commission overview, which includes scope and timeline, original statute, amended statute, technologies and methods, and biographies of the commissioners; Commission finances; Commission meetings for the year 2000;…
Descriptors: Access to Information, Child Safety, Children, Federal Legislation
Hodges, Marjorie W.; Worona, Steven L. – CAUSE/EFFECT, 1996
Provides guidelines for the development of campus computer policies, focusing on legal issues related to adult material, harassment, privacy, commerce, and copyright. Notes that computer use policies and practices need to evolve in concert with the changing computer culture. (MDM)
Descriptors: Business, College Role, Computer Networks, Computers
McIsaac, Marina Stock; Rowe, Jeremy – New Directions for Community Colleges, 1997
Argues that community colleges must address four major issues regarding intellectual property and the development of Internet course materials: copyright, fair use, duplication and revenue generation for print and nonprint educational materials. Suggests that intellectual property issues be viewed as a continuum from low to high levels of risk.…
Descriptors: Community Colleges, Copyrights, Distance Education, Educational Technology
Previous Page | Next Page ยป
Pages: 1 | 2