Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 3 |
Guidelines | 3 |
Computers | 2 |
Access to Computers | 1 |
Administration | 1 |
Civil Liberties | 1 |
Colleges | 1 |
Computer Science Education | 1 |
Court Litigation | 1 |
Due Process | 1 |
Educational Objectives | 1 |
More ▼ |
Author
Kalle Grill | 1 |
Karin Danielsson | 1 |
Lena Enqvist | 1 |
Loïs Vanhée | 1 |
Melania Borit | 1 |
Sermersheim, Michael D. | 1 |
Stover, Mark | 1 |
Publication Type
Guides - Non-Classroom | 2 |
Books | 1 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Education Level
Audience
Practitioners | 3 |
Administrators | 2 |
Media Staff | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security