Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Laws | 6 |
Internet | 4 |
Ethics | 3 |
Federal Legislation | 3 |
Information Technology | 3 |
Privacy | 3 |
Business Administration… | 2 |
Confidential Records | 2 |
Educational Policy | 2 |
Foreign Countries | 2 |
More ▼ |
Source
EDUCAUSE Quarterly | 2 |
Information Systems Education… | 1 |
Journal of Digital Learning… | 1 |
Universal Journal of… | 1 |
World Journal on Educational… | 1 |
Author
Anderson, Alicia | 1 |
Fusilier, Marcelline | 1 |
Nixon, Andrea | 1 |
Penrod, Charlie | 1 |
Peslak, Alan R. | 1 |
Pimdee, Paitoon | 1 |
Pusey, Portia | 1 |
Ruenphongphun, Prarichart | 1 |
Sadera, William A. | 1 |
Sukkamart, Aukkapong | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Audience
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Thai Undergraduate Digital Citizenship Skills Education: A Second-Order Confirmatory Factor Analysis
Ruenphongphun, Prarichart; Sukkamart, Aukkapong; Pimdee, Paitoon – World Journal on Educational Technology: Current Issues, 2021
From the study's initial qualitative analysis, 10 latent variables and 22 indicators concerning digital citizenship skills (DCS) were used in a questionnaire on a sample of 506 Thai Business Computer Programme undergraduate students attending one of six regional Thai Rajabhat Universities. Goodness-of-fit and descriptive statistical analysis…
Descriptors: Undergraduate Students, Citizenship Education, Business Administration Education, Student Attitudes
Fusilier, Marcelline; Penrod, Charlie – Universal Journal of Educational Research, 2013
The growth of e-business has been accompanied by even faster increases in losses from security breaches, legal problems, and cybercrime. These unnecessary costs inhibit the growth and efficiency of e-business worldwide. Professional education in e-business can help address these problems by providing students with coursework aimed at them. The…
Descriptors: Internet, Crime, Business Administration Education, College Curriculum
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers