Publication Date
In 2025 | 0 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 23 |
Since 2016 (last 10 years) | 91 |
Since 2006 (last 20 years) | 407 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 46 |
Media Staff | 25 |
Policymakers | 22 |
Teachers | 21 |
Administrators | 19 |
Counselors | 7 |
Parents | 6 |
Students | 5 |
Researchers | 4 |
Community | 1 |
Support Staff | 1 |
More ▼ |
Location
United States | 41 |
Canada | 34 |
United Kingdom | 26 |
Australia | 22 |
California | 12 |
New Zealand | 9 |
European Union | 8 |
Netherlands | 8 |
New York | 8 |
China | 6 |
Florida | 6 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Sequential Tests of… | 1 |
What Works Clearinghouse Rating
Thur, Victoria L. – Journal of Access Services, 2009
The U.S. government has sought to restrict the freedoms of its citizens in times of war from World War I to the present. The banners of fear, war, terrorism, and nationwide security placed constitutional rights under a renewed scrutiny. This paper will focus on the passage of laws that restrict academic and intellectual freedoms during war, and…
Descriptors: Intellectual Freedom, Access to Information, National Security, Academic Freedom
Ribera, Mireia; Porras, Merce; Boldu, Marc; Termens, Miquel; Sule, Andreu; Paris, Pilar – Program: Electronic Library and Information Systems, 2009
Purpose: The purpose of this paper is to explain the changes in the Web Content Accessibility Guidelines (WCAG) 2.0 compared with WCAG 1.0 within the context of its historical development. Design/methodology/approach: In order to compare WCAG 2.0 with WCAG 1.0 a diachronic analysis of the evolution of these standards is done. Known authors and…
Descriptors: Guidelines, Internet, Access to Information, Web Sites
Rampell, Catherine – Chronicle of Higher Education, 2008
The high prices of textbooks, which are approaching $1,000 per year for an average student, have those students and their professors crying for mercy. Flat World Knowledge, a new digital-textbook publisher, has the answer to this problem. Starting next year, the publisher will offer online, peer-reviewed, interactive, user-editable textbooks, free…
Descriptors: Textbook Publication, Electronic Publishing, Access to Information, Information Policy
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Schuck, Sandy; Aubusson, Peter; Kearney, Matthew – Contemporary Issues in Technology and Teacher Education (CITE Journal), 2010
The paper discusses the implications of the current phenomenon of adolescent engagement in digital spaces. Young people are increasingly active Web 2.0 users, and their interactions through these technologies are altering their social identities, styles of learning, and exchanges with others around the world. The paper argues for more research to…
Descriptors: Ethnography, Adolescents, Classroom Environment, Adolescent Attitudes
Parry, Marc – Chronicle of Higher Education, 2009
As the federal government prepares to pour billions of stimulus dollars into increased broadband Internet access, colleges are trying to claim much of the money and shape the emerging national networking policy. Their focus is $4.7-billion that will be doled out under a new grant program administered by a small Commerce Department agency called…
Descriptors: Access to Information, Telecommunications, Internet, Grants
Iannacci, Federico; Cornford, Tony; Cordella, Antonio; Grillo, Francesco – Evaluation Review, 2009
In contrast to the prevailing image of monitoring systems as technical systems, it is proposed that they should rather be conceived of as social endeavors at exchanging information. Drawing on the monitoring and evaluation framework of Cornford, Doukidis, and Forster, the concept of information agreement is suggested as a way of assessing the…
Descriptors: Evaluation Methods, Foreign Countries, Information Policy, Information Systems
Western Interstate Commission for Higher Education, 2012
WICHE (the Western Interstate Commission for Higher Education) is a regional, nonprofit organization. WICHE and its 15 member states work to improve access to higher education and ensure student success. Its student exchange programs, regional initiatives, and its research and policy work allow it to assist constituents throughout the West and…
Descriptors: Higher Education, Nonprofit Organizations, Program Administration, Student Exchange Programs
Center for the Future of Teaching and Learning, 2010
When a child is placed in the state's foster care system because of a parent's abuse or neglect, the state--represented by teams of social workers, lawyers, judges, foster parents, and other caregivers or guardians--steps into many aspects of the parental role. Too often, though, the state's representatives are attempting to fulfill a parental…
Descriptors: Child Welfare, Social Work, Foster Care, Public Policy
Foster, Andrea L. – Chronicle of Higher Education, 2008
The University of Iowa has reversed course on a plan to make some students' theses freely available online, following protests from students in the university's writing programs. The students said the plan could have threatened the potential commercial value of their novels, plays, and other creative works. The controversy began in late winter,…
Descriptors: Graduate Students, Copyrights, Degree Requirements, Writing (Composition)
Stephens, Karen – Exchange: The Early Childhood Leaders' Magazine Since 1978, 2008
There are many benefits of e-mails. Through e-mail, a person can relay specific details to any number of "need to know" persons at the press of a "send" key at any time of day, without playing endless phone tag or waking someone up on the wrong side of the time zone. A person can also get "newsy" information out fast and save printing money, too.…
Descriptors: Early Childhood Education, Internet, Electronic Mail, Information Policy
Mokhtar, Intan Azura; Foo, Schubert; Majid, Shaheen; Theng, Yin Leng; Luyt, Brendan; Chang, Yun-Ke – Education for Information, 2009
Several comprehensive information literacy (IL) standards have been developed worldwide for use in the education sector, specifically for students and teachers. Apart from the more generic International Federation of Library Associations (IFLA) IL standards, such standards are more appropriate for their countries of origins. If these standards are…
Descriptors: Library Associations, Information Seeking, Foreign Countries, International Organizations
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…
Descriptors: Copyrights, Competition, Privacy, Free Enterprise System
Swanson, Troy A.; Gregory, Dennis E.; Raspiller, Edward E. – Community College Enterprise, 2012
As the oldest implementation of Web 2.0 technologies, blogs present an opportunity to understand how community college administrators are addressing two conundrums: conundrum of control and the conundrum of adaptability. These problems arise from the need of leaders to put organizational controls in place even as these controls limit the tool's…
Descriptors: Web Sites, Electronic Publishing, Web 2.0 Technologies, Program Implementation
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients