NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Lipka, Sara – Chronicle of Higher Education, 2009
Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…
Descriptors: Music, Industry, Hearings, Copyrights
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Foster, Andrea L. – Chronicle of Higher Education, 2005
U.S. Supreme Court justices struggled in a lively debate with how to balance the competing interests of the entertainment industry and developers of file-sharing technology. Some justices sharply questioned whether it was fair to hold inventors of a distribution technology liable for copyright infringement, while others suggested that it was wrong…
Descriptors: Copyrights, Computer Networks, Court Litigation, Hearings
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This July 9, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Learning Communities Can Be Cohesive-And Divisive" (Jaffee, David); (2)…
Descriptors: Higher Education, College Freshmen, Cooperative Learning, College Presidents