Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Intellectual Property | 6 |
Ethics | 4 |
Crime | 3 |
Information Security | 3 |
Information Technology | 3 |
College Faculty | 2 |
Electronic Mail | 2 |
Internet | 2 |
Privacy | 2 |
Access to Information | 1 |
More ▼ |
Source
Information Systems Education… | 2 |
Contemporary Issues in… | 1 |
International Journal of… | 1 |
Online Submission | 1 |
Turkish Online Journal of… | 1 |
Author
Akcay, Behiye | 1 |
Brooks, Rochelle | 1 |
Kabata, Victor | 1 |
Ladwig, Christine | 1 |
Peslak, Alan R. | 1 |
Schwieger, Dana | 1 |
Wyne, Mudasser F. | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Reports - Evaluative | 2 |
Reports - Research | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Audience
Location
Pennsylvania | 1 |
United Arab Emirates (Abu… | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Akcay, Behiye – Turkish Online Journal of Distance Education, 2008
The purpose of this study is to discuss the ethical issues in education in terms of teachers, students, schools, and software companies. Recent growth of the internet and World Wide Web allows new developments in the way instructors transfer knowledge to their students. Technology is a new tool in education that constantly changes and offers new…
Descriptors: Educational Technology, Internet, Ethics, Computer Security
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security