NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 61 to 75 of 143 results Save | Export
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…
Descriptors: Copyrights, Competition, Privacy, Free Enterprise System
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Wu, Yuehua – ProQuest LLC, 2010
The development and diffusion of information and communication technologies, particularly the internet, creates a worldwide trend of using ICTs and the internet to deliver public services. This new form of electronic administration--e-government--potentially offers great benefits to society in that it can enhance public service efficiency,…
Descriptors: Foreign Countries, Governance, Information Dissemination, Telecommunications
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Data Quality Campaign, 2011
Statewide Longitudinal Data Systems (SLDS) provide the information and tools needed to inform policies, practices and decisions at every level to improve student achievement and system performance. It is equally important that there are policies and practices to protect personally identifiable information and to ensure the confidentiality and…
Descriptors: State Agencies, Student Records, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
McClanahan, Kitty – Bulletin of Science, Technology & Society, 2008
Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…
Descriptors: Medical Services, Medical Education, Privacy, Confidential Records
Data Quality Campaign, 2010
This report presents survey results of the 10 State Actions including status of all 50 states, the District of Columbia and Puerto Rico. These State Actions include: (1) Link P-20/workforce data systems; (2) Create stable, sustained support for robust state longitudinal data systems; (3) Develop governance structures to guide data collection,…
Descriptors: Stakeholders, Governance, Foreign Countries, Educational Change
Data Quality Campaign, 2010
State education data systems have often been described as data rich but information poor. Historically, these systems were created for compliance purposes and, therefore, designed and managed as information technology projects, but a culture change is under way. Educators and other stakeholders are beginning to value data as a tool to inform…
Descriptors: Information Technology, Information Needs, Stakeholders, Data Collection
Anderson, Catherine L. – ProQuest LLC, 2010
Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. This dissertation seeks to improve extant understanding of how…
Descriptors: Cues, Health Education, Hospitals, Health Conditions
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Baker, Thomas R. – New Directions for Student Services, 2008
This chapter describes the relationship between federal student privacy laws and state privacy laws, and identifies the changes in the federal law over the last ten years affecting disclosure to parents of college students. Recent litigation on health emergencies is outlined and the limited rights of college students not yet eighteen years of age…
Descriptors: College Students, Access to Information, Privacy, Information Policy
Data Quality Campaign, 2010
To address key policy and programmatic questions and help improve student and system performance, states must work to link data across the early childhood, postsecondary and workforce (P-20/workforce) spectrum and share this information with appropriate stakeholders. This issue brief highlights current efforts in California, Florida, Indiana, and…
Descriptors: Stakeholders, State Programs, Program Descriptions, Education Work Relationship
Farrall, Kenneth N. – ProQuest LLC, 2009
This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS--comprising interconnecting subsystems of records and identification--damage individual autonomy and self-determination, impacting not only…
Descriptors: Foreign Countries, Case Studies, Social Systems, Risk Management
Peer reviewed Peer reviewed
Gannon-Leary, Pat – Electronic Library, 1997
As a result of litigation, a number of companies have written policies declaring the right to monitor employee electronic communication. Discusses reasons why employers monitor employee e-mail, the prevalence of monitoring in universities, use and ethics policy statements, and bills of rights statements protecting employee privacy. (PEN)
Descriptors: Electronic Mail, Ethics, Higher Education, Information Policy
Peer reviewed Peer reviewed
Samoriski, Jan H.; And Others – Journal of Broadcasting & Electronic Media, 1996
Attempts to clarify the status of e-mail privacy under the Electronic Communications Privacy Act of 1986 (ECPA). Examines current law and the paucity of definitive case law. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e-mail,…
Descriptors: Computer Security, Electronic Mail, Information Policy, Laws
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10