Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Author
Bertram, Burt | 1 |
Brown, Abbie | 1 |
Brown, David S. | 1 |
Corn, Michael | 1 |
Ennis-Cole, Demetria | 1 |
Green, Tim | 1 |
Lavagnino, Merri Beth | 1 |
Lawhon, David C. | 1 |
Lawhon, Tommie | 1 |
Nixon, Andrea | 1 |
Robinson, LeAnne K. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Reports - Research | 2 |
Books | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Canada | 1 |
Pennsylvania | 1 |
Turkey | 1 |
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
Wheeler, Anne Marie; Bertram, Burt – American Counseling Association, 2019
This eighth edition provides a current and comprehensive discussion of counselors' legal and ethical responsibilities, an examination of state and federal laws as they relate to practice, and helpful risk management strategies. Attorney Nancy Wheeler and Burt Bertram, a private practitioner and counselor educator, offer real-world practical tips…
Descriptors: School Counselors, School Counseling, Legal Responsibility, Ethics
Tosun, Nilgün – International Journal of Curriculum and Instruction, 2021
After the World Health Organization declared COVID-19 a pandemic, universities in Turkey, like many other countries, began compulsory distance education in March. Most of the courses are conducted by distance education. Millions of students and academics have been involved in distance education through technologies enabled by the existing…
Descriptors: Foreign Countries, COVID-19, Pandemics, Distance Education
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Suppo, Chris A. – ProQuest LLC, 2013
The purpose of this study was to investigate digital citizenship in Pennsylvania public schools based on the responses of school leaders including superintendents, curriculum coordinators, and technology coordinators. This study examined the relationship between Pennsylvania school leader's beliefs and the implementation of digital citizenship…
Descriptors: Public Schools, Administrator Attitudes, Correlation, Educational Technology
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Lawhon, Tommie; Ennis-Cole, Demetria; Lawhon, David C. – Community College Journal of Research & Practice, 2006
Practical information on the necessity for community colleges, instructors, and students to understand and abide by the copyright laws is essential. Whether developing, structuring, maintaining, or presenting courses, or instructing students on the development of their own papers, one must be knowledgeable about plagiarism, the Fair Use Act, and…
Descriptors: Copyrights, Plagiarism, Distance Education, Community Colleges
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers