Publication Date
In 2025 | 0 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 23 |
Since 2016 (last 10 years) | 91 |
Since 2006 (last 20 years) | 407 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 46 |
Media Staff | 25 |
Policymakers | 22 |
Teachers | 21 |
Administrators | 19 |
Counselors | 7 |
Parents | 6 |
Students | 5 |
Researchers | 4 |
Community | 1 |
Support Staff | 1 |
More ▼ |
Location
United States | 41 |
Canada | 34 |
United Kingdom | 26 |
Australia | 22 |
California | 12 |
New Zealand | 9 |
European Union | 8 |
Netherlands | 8 |
New York | 8 |
China | 6 |
Florida | 6 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Sequential Tests of… | 1 |
What Works Clearinghouse Rating

King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology

Lopez, Xavier R. – Journal of Academic Librarianship, 1997
Examines two multilateral approaches that aim to raise the level of intellectual property protection for databases. Discusses how both proposals, the European Union (EU) new Database Directive and the World Intellectual Property Organization (WIPO) treaty fail to provide ample copyright exemption provisions, necessary for offsetting the expanded…
Descriptors: Access to Information, Copyrights, Databases, Fair Use (Copyrights)

George, Joey F.; And Others – Information Infrastructure and Policy, 1995
Examines what the term "information society" really means and investigates how it is related to national computer plans (NCPs). Analysis of several NCPs indicates that nations are more concerned with a general need to bolster and improve their national economies than in encouraging social transformation. (JKP)
Descriptors: Computer Attitudes, Computers, Economic Development, Economic Opportunities

Perritt, Henry H., Jr. – Government Information Quarterly, 1996
Discusses how open computer network architecture, along with the browsing capabilities of the World Wide Web, facilitates the dissemination of public information. Competitive markets will be created as those from the private sector package electronic information with value added. Copyright law and information pricing policies are outlined, and…
Descriptors: Competition, Computer Networks, Copyrights, Electronic Publishing

Kesar, Shalini; Rogerson, Simon – Social Science Computer Review, 1998
Analyzes the nature of computer misuse. Addresses issues that deal with managing and controlling computer misuse that will help in developing ethical practices to minimize computer misuse. Argues that by addressing ethical issues at both formal and informal levels, the risks associated with information technology usage can be minimized.…
Descriptors: Access to Information, Computer Attitudes, Computer Uses in Education, Ethics

O'Connell, Brian M. – Social Science Computer Review, 1998
Following a brief consideration of the role of rhetoric in law, science, and policy, explores how rhetorical accounts of new technologies influence the course of legislative, judicial, and regulatory decisions. Proposes that such themes have the powerful capacity to determine outcomes and to shape modern concepts of both individual and societal…
Descriptors: Civil Liberties, Court Litigation, Decision Making, Ethics

Crawford, Gregory A. – Public Libraries, 2000
Plots trends in the growth of Internet use. Discusses pornography on the Web, using filters, and the ALA response. Reports results of a survey of Internet availability within Pennsylvania public libraries. Findings indicate more than 90% of respondents offer access to the Internet, nearly 80% do not use filters, and 50% attempt to control access…
Descriptors: Access to Information, Information Policy, Internet, Library Policy

Dorner, Daniel G. – Library Quarterly, 2002
Explores organizational influence in the policy network that formed around the issue of determining essential services on the Canadian information highway. Qualitative content analysis found the essential services issue had two main aspects: ensuring universal access to telecommunications networks and determining the criteria for defining…
Descriptors: Access to Information, Computer Networks, Foreign Countries, Information Networks

Neal, James G. – Journal of Library Administration, 1999
Examines the changes that are affecting academic library collection development. Highlights include computer technology; digital information; networking; virtual reality; hypertext; fair use and copyrights; technological infrastructure; digital libraries; information policy; academic and scholarly publishing; and experiences at the Johns Hopkins…
Descriptors: Academic Libraries, Computer Networks, Electronic Libraries, Higher Education

Tomov, D. T. – Journal of Documentation, 2001
A semantic analysis of the "Weekly Subject Index Stop Word List" of "Current Contents" of the Institute for Scientific Information (ISI) and the full-stop word and semi-stop word lists of the Permuterm Subject Index of "Science Citation Index" was conducted. Emphasizes the necessity of an improved, semantically-oriented policy in preparing lists…
Descriptors: Authority Control (Information), Citations (References), Data Analysis, Databases
Smith, Sean W. – EDUCAUSE Quarterly, 2004
At Dartmouth College, the author teaches a course called "Security and Privacy." Its early position in the overall computer science curriculum means the course needs to be introductory, and the author can't assume the students possess an extensive computer science background. These constraints leave the author with a challenge: to construct…
Descriptors: Homework, Assignments, Privacy, Computer Security
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Canadian Teachers' Federation, Ottawa (Ontario). – 1995
Following a brief description of educational networking initiatives in Canada, this paper points out some barriers to the further expansion of electronic networking in K-12 classrooms. Disparities in existing infrastructure are described, and considerations about the need to maintain the relevance of educational tools to the learner environment…
Descriptors: Access to Information, Cost Effectiveness, Educational Technology, Elementary Secondary Education
Council on Library and Information Resources, Washington, DC. – 2002
The United States Congress in December 2000 appropriated funds to the Library of Congress (LC) to spearhead an effort to develop a national strategy for the preservation of digital information. LC staff scheduled a series of conversations with representatives from the technology, business, entertainment, academic, legal, archival, and library…
Descriptors: Archives, Electronic Text, Information Policy, Information Sources
McCook, Kathleen de la Pena – 2002
This paper provides some of the historical context of the efforts of the American Library Association (ALA) to define, extend, protect and advocate for equity of access, focusing on central tendencies rather than internal debate. The first section, "Toward the Concept of Access," discusses: how ALA became a public service organization; extension…
Descriptors: Access to Information, Information Policy, Information Technology, Intellectual Freedom