Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 12 |
Descriptor
Information Policy | 35 |
Internet | 35 |
Privacy | 35 |
Access to Information | 21 |
Information Technology | 17 |
Computer Security | 9 |
Copyrights | 8 |
Policy Formation | 7 |
Censorship | 6 |
Confidentiality | 6 |
Federal Legislation | 6 |
More ▼ |
Source
Author
Atkinson, Robert D. | 2 |
Boninger, Faith | 2 |
Molnar, Alex | 2 |
AL Faresi, Ahmed | 1 |
Anderson, John A. | 1 |
Barto, Thomas Peter | 1 |
Berson, Ilene R. | 1 |
Berson, Michael J. | 1 |
Brandt, D. Scott | 1 |
Burbules, Nicholas C. | 1 |
Burk, Dan L. | 1 |
More ▼ |
Publication Type
Education Level
Elementary Secondary Education | 4 |
Adult Education | 1 |
Higher Education | 1 |
Audience
Practitioners | 3 |
Media Staff | 2 |
Administrators | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
First Amendment | 2 |
Health Insurance Portability… | 1 |
United States Constitution | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Seroff, Jole – Knowledge Quest, 2015
In this article, the author states that school librarians can contribute to an atmosphere that supports intellectual freedom by drawing attention to the subtle messages about community values--messages that are communicated by virtue of what is included or excluded from curricular and co-curricular offerings. The author address issues with…
Descriptors: Intellectual Freedom, Curriculum Development, Educational Needs, School Libraries
Molnar, Alex; Boninger, Faith – National Education Policy Center, 2015
Computer technology has made it possible to aggregate, collate, analyze, and store massive amounts of information about students. School districts and private companies that sell their services to the education market now regularly collect such information, raising significant issues about the privacy rights of students. Most school districts lack…
Descriptors: Privacy, Information Security, Data, Student Records
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Barto, Thomas Peter – ProQuest LLC, 2011
Global electronic markets will profoundly impact commerce in the 21 st century. Brick-and-mortar retailers are using technology for electronic marketing purposes where the familiar layout of the physical store becomes a maze of pulldown menus, product indices, and search features creating a new unknown for consumers and concerns for information…
Descriptors: Internet, Vendors, Information Policy, Business Administration
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…
Descriptors: Copyrights, Competition, Privacy, Free Enterprise System
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Wu, Yuehua – ProQuest LLC, 2010
The development and diffusion of information and communication technologies, particularly the internet, creates a worldwide trend of using ICTs and the internet to deliver public services. This new form of electronic administration--e-government--potentially offers great benefits to society in that it can enhance public service efficiency,…
Descriptors: Foreign Countries, Governance, Information Dissemination, Telecommunications
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification

Oppenheim, Charles – Journal of Information Science, 1996
Discusses the development a national information policy in the United Kingdom (UK): policies for national information infrastructures, electronic information services, privacy and data protection, copyright, public and national libraries; reviews problems inhibiting Internet use; compares the UK's and the European Commission's approaches to…
Descriptors: Computer Security, Copyrights, Foreign Countries, Information Policy
Berson, Ilene R.; Berson, Michael J. – International Journal of Social Education, 2006
The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy. It is the statutory right to privacy that has been most closely aligned with data protection as a form of self-protection. The U.S. Federal Trade Commission…
Descriptors: Privacy, Personal Autonomy, Child Advocacy, Access to Information
Kleeman, Michael J. – 1999
The goals of the Fourth Annual Aspen Institute Roundtable on International Telecommunications were: to address procedural and substantive solutions for international coordination of Internet policy issues; to suggest different models for dispute resolution and policy coordination that might be employed in the various contexts of Internet usage;…
Descriptors: Access to Information, Foreign Countries, Information Policy, Intellectual Property
Brandt, D. Scott – Computers in Libraries, 1998
Examines Internet security risks and how users can protect themselves. Discusses inadvertent bugs in software; programming problems with Common Gateway Interface (CGI); viruses; tracking of Web users; and preventing access to selected Web pages and filtering software. A glossary of Internet security-related terms is included. (AEF)
Descriptors: Access to Information, Computer Security, Computer Software, Glossaries