NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Nguyen, Lilly Uyen – ProQuest LLC, 2013
This dissertation explores the social worlds of pirated software discs and free/open source software in Vietnam to describe the practices of copying, evangelizing, and translation. This dissertation also reveals the cultural logics of similarity and continuity that sustain these social worlds. Taken together, this dissertation argues that the…
Descriptors: Foreign Countries, Computer Networks, Computer Software, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Lipka, Sara – Chronicle of Higher Education, 2009
Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…
Descriptors: Music, Industry, Hearings, Copyrights
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Valenza, Joyce Kasman; Johnson, Doug – School Library Journal, 2009
The library, as we once knew it, may no longer be relevant. And, yet, this is undoubtedly the most exciting time in history to be a librarian. The future of the school library as a relevant and viable institution is largely dependent on librarians and how quickly they respond to change. They worry about their field and their practice. They worry…
Descriptors: Intellectual Freedom, Intellectual Property, Computers, School Libraries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
Hendrix, Dean – portal: Libraries and the Academy, 2007
To assess their knowledge, use, and attitudes regarding peer-to-peer (P2P) applications, this study surveyed academic librarians (n = 162) via a mail-in survey. Correlations between the sample characteristics (age, gender, year of MLS, type of library job) and P2P knowledge, use, and attitudes were also explored. Overall, academic librarians…
Descriptors: Academic Libraries, Information Technology, Library Services, Ethics
Electronic Frontier Foundation, 2006
This paper is intended to help institutions of higher education critically evaluate the principal technological tools and policies being used to enforce copyright on campus networks. It first explores where the goals of copyright holders and universities overlap and where they conflict. It then discusses the pros and cons of the major solutions…
Descriptors: Colleges, Copyrights, Higher Education, Computer Networks
OECD Publishing (NJ1), 2006
The development of digital content raises new issues as rapid technological developments challenge existing business models and government policies. This OECD study identifies and discusses six groups of business and public policy issues and illustrates these with existing and potential OECD Digital Content Strategies and Policies: (1) Innovation…
Descriptors: Intellectual Property, Job Skills, Job Training, Foreign Countries