NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 196 to 210 of 903 results Save | Export
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Pierce, Margo – T.H.E. Journal, 2012
"If one life is saved, then it's worth it." That is the cliched argument frequently used to justify banning electronic communications, websites, and other forms of technology in schools. The common belief is that these prohibitions will prevent, among other things, the sexual assault of minors or suicides related to cyberbullying. But that…
Descriptors: Internet, Child Safety, Safety Education, Information Policy
Valentine, Christopher – Communique, 2013
As use of the Internet becomes more prevalent in society and daily living, there has been increased attention to the risks, especially threats that young people may face. One of these risks is online sexual solicitation, in which an individual contacts a minor over the Internet, generally with the intent of making face-to-face sexual contact.…
Descriptors: Risk, Internet, Sexual Abuse, School Psychologists
Calhoun, Kelly J. – Leadership, 2012
ACSA (Association of California School Administrators), the CSBA (California School Boards Association), the California Educational Technology Professionals Association, the Santa Clara County Office of Education, CUE (Computer Using Educators), the law firm Fagen, Friedman & Fulfrost and others have joined forces to develop policies that can…
Descriptors: Educational Technology, Guidelines, Educational Change, Technology Uses in Education
Devgan, Vipan – ProQuest LLC, 2012
Many organizations recognize employees as great assets in the efforts to reduce risk related to information security. Employee's compliance with information security rules and regulations of organization is the key to strengthening information security. It is crucial for organizations to understand factors affecting technology compliance to…
Descriptors: Self Efficacy, Compliance (Legal), Information Security, Information Policy
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Peer reviewed Peer reviewed
Direct linkDirect link
Peekhaus, Wilhelm – Government Information Quarterly, 2011
This paper examines the difficulties encountered by Biowatch, a South African civil society environmental organization, in its attempts to obtain access to government information in respect of genetically engineered plants. After establishing the context of South Africa's access to information regime, including a brief discussion of several of its…
Descriptors: Access to Information, Court Litigation, Foreign Countries, Constitutional Law
Petruniak, Mark; Krokosky, Alyson; Terry, Sharon F. – Exceptional Parent, 2011
This article discusses the Genetic Information Nondiscrimination Act (GINA) which President George W. Bush officially signed in 2008. The law prohibits employers from making adverse employment decisions based on a person's genetic information, including family health history. It also forbids insurance companies from discriminating against…
Descriptors: Health Services, Civil Rights, Genetics, Scientific and Technical Information
Peer reviewed Peer reviewed
Direct linkDirect link
Bradley, Loretta J.; Hendricks, Bret; Kabell, Douglas R. – Family Journal: Counseling and Therapy for Couples and Families, 2011
In an era of increased need and expectation for confidentiality, the counseling record of the deceased client challenges confidentiality. Using ethical codes and legal mandates, the authors explore whether the counseling record of a deceased client should be released when the client's will and the client's counseling records are silent on this…
Descriptors: Confidentiality, Ethics, Compliance (Legal), Legal Problems
Peer reviewed Peer reviewed
Direct linkDirect link
Kervin, Lisa; Jones, Sandra C.; Mantei, Jessica – E-Learning and Digital Media, 2012
It is recognised that from a young age children spend considerable portions of their leisure time on the Internet. In Australia a number of child-targeted magazines have associated websites, which have high and ever-increasing readership. We do not yet know the impact of this medium upon children. Overt advertising is evident on webpages, but so…
Descriptors: Advertising, Critical Reading, Foreign Countries, Media Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Green, John; Rutherford, Scott; Turner, Thomas – Perspectives: Policy and Practice in Higher Education, 2009
The authors recognise that there is no "one-size-fits-all" approach to implementing business intelligence strategy within universities. Elements of best practice have been taken from a case study of Imperial College, which may be applied across other institutions. The process starts with implementing and developing systems that capture…
Descriptors: Intelligence, Internet, Information Policy, Universities
Kaser, Dick – Computers in Libraries, 2009
According to the recent survey of Association of Learned and Professional Society Publishers (ALPSP), one of the several top trends in publishing nowadays is the licensing liberalization among publishers. Licensing options now abound and there are various price points for libraries considering new collections. One such example is how SAGE offers…
Descriptors: Certification, Library Services, Online Vendors, Information Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Potoski, Matthew; Prakash, Aseem – Journal of Policy Analysis and Management, 2009
Spatial, cultural, and linguistic barriers create information asymmetries between buyers and sellers that impede international trade. The International Organization for Standardization's ISO 9000 program is designed to reduce these information asymmetries by providing assurance about the product quality of firms that receive its certification.…
Descriptors: International Trade, Barriers, Certification, Standards
Peer reviewed Peer reviewed
Direct linkDirect link
Relyea, Harold C. – Government Information Quarterly, 2009
For the Federal government of the United States, freedom of information policy is expressed in statutory law--the Freedom of Information Act (FOIA), enacted in 1966, being the first such expression in this regard. Other transparency laws would follow. The FOIA, however, was legislated in the face of considerable opposition by the executive branch.…
Descriptors: Federal Government, Information Policy, Federal Legislation, Access to Information
Simon, Fran – Exchange: The Early Childhood Leaders' Magazine Since 1978, 2011
Everyone's doing it: Tweeting, "friending," blogging, linking, texting, and otherwise zipping around all over the social media landscape. Social media has become more than just a pastime. It is officially now another important communication medium early childhood educators use to establish and enhance meaningful relationships with parents,…
Descriptors: Early Childhood Education, Performance Factors, Social Networks, Network Analysis
Pages: 1  |  ...  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  ...  |  61