NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Copyright Law 19763
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 29 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christine Ladwig; Dana Schwieger; Reshmi Mitra – Information Systems Education Journal, 2025
The rapid rise of AI use is creating some very serious legal and ethical issues such as bias, discrimination, inequity, privacy violations, and--as creators everywhere fear--theft of protected intellectual property. Because AI platforms "learn" by scraping training materials available online or what is provided to them through their…
Descriptors: Copyrights, Plagiarism, Intellectual Property, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christine Ladwig; Dana Schwieger – Information Systems Education Journal, 2024
Hollywood screenwriters worry about Artificial Intelligence (AI) replacements taking over their jobs. Famous museums litigate to protect their art from AI infringement. A major retailer scraps a machine-learning based recruitment program that was biased against women. These are just a few examples of how AI is affecting the world of work,…
Descriptors: Computer Science Education, Curriculum Development, Information Systems, Information Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lindh, Maria; Nolin, Jan – European Educational Research Journal, 2016
The aim of this study is to show how Google's business model is concealed within Google Apps for Education (GAFE) as well as how such a bundle is perceived within one educational organisation, consisting of approximately 30 schools. The study consists of two parts: 1) a rhetorical analysis of Google policy documents and 2) an interview study in a…
Descriptors: Privacy, Data Collection, Information Sources, Program Implementation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nyinkeu, Ngatchu Damen; Thaddeus, Kabuin; Henry, Ngatchu – International Journal of Technology in Teaching and Learning, 2016
In an era when its is increasingly encouraged to share source-codes, the training of students, particularly information technology students, faces several challenges in communicating aspects of academic honesty -- precisely authenticity of authorship. The genuineness of this issue has implications primarily in the integral formation of students…
Descriptors: Open Source Technology, Ethics, Pedagogical Content Knowledge, Plagiarism
Peer reviewed Peer reviewed
Direct linkDirect link
Baker, Stewart C. – Journal of Library & Information Services In Distance Learning, 2014
This article argues that accessibility and universality are essential to good Web design. A brief review of library science literature sets the issue of Web accessibility in context. The bulk of the article explains the design philosophies of progressive enhancement and responsive Web design, and summarizes recent updates to WCAG 2.0, HTML5, CSS…
Descriptors: Web Sites, Computer System Design, Computer Software, Computer Software Reviews
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Manohar, Priyadarshan A.; Acharya, Sushil; Wu, Peter; Hansen, Mary; Ansari, Ali; Schilling, Walter – Journal of Education and Learning, 2015
Two critical problems facing the software (S/W) industry today are the lack of appreciation of the full benefits that can be derived from Software Verification and Validation (V&V) and an associated problem of shortage of adequately trained V&V practitioners. To address this situation, the software V&V course curriculum at the author's…
Descriptors: Case Studies, Learner Engagement, Active Learning, Computer Software
Evans, Thomas S.; Getman, George J. – American School and University, 1984
Various legal methods, such as copyright, trade secret, and patent law, protect proprietary rights in computer software. Users of this software must respect these rights or face infringement lawsuits. (TE)
Descriptors: Compliance (Legal), Computer Software, Copyrights, Federal Regulation
Peer reviewed Peer reviewed
Helyar, Pamela S.; Doudnikoff, Gregory M. – Technical Communication: Journal of the Society for Technical Communication, 1994
Describes why developers of multimedia products face a more complex legal landscape than do developers of "few-media" products. Describes the laws that pertain to multimedia. Discusses how developers of multimedia products might walk the legal labyrinth and protect themselves and their companies from lawsuits. (SR)
Descriptors: Computer Software, Copyrights, Higher Education, Legal Problems
Peer reviewed Peer reviewed
Gemignani, Michael – College Mathematics Journal, 1989
Discusses copyright laws applied to computer software for professors, students, and institutions. Concepts including infringement, contributory infringement, first sale doctrine, and licenses are considered. A sample university policy statement to avoid liability is presented. (YP)
Descriptors: Computer Software, Copyrights, Higher Education, Intellectual Property
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Matsuura, Jeffrey H. – Research Management Review, 2004
This paper reviews the economic models most commonly applied to estimate the value of intellectual property and other forms of intangible assets. It highlights the key strengths and weaknesses of these models. One of the apparent weaknesses of the most commonly used valuation models is the failure to incorporate legal rights into their…
Descriptors: Intellectual Property, Accounting, Models, Ownership
Peer reviewed Peer reviewed
Brink, Dan – Modern Language Journal, 1986
To solve the software piracy problem in education, teachers and professionals in positions of responsibility relative to computing must refuse to "go along with" the practice of unauthorized piracy. Software producers must work out agreements that will permit educational institutions to have quality software at reasonable prices. (CB)
Descriptors: Administrator Responsibility, Business Responsibility, Computer Software, Copyrights
Warrick, Thomas S. – Bulletin of the American Society for Information Science, 1984
Discussion of the effects of copyright on microcomputer software highlights the nature of copyright and situations in which the copying of copyrighted software may be permitted. Rights that a purchaser should insist upon when contracting for computer equipment are noted, i.e., right to test hardware and software prior to purchase. (EJS)
Descriptors: Computer Software, Consumer Protection, Copyrights, Federal Legislation
Peer reviewed Peer reviewed
Thomas, Daphyne Saunders – Internet Research, 1997
Considers the availability of pornography, particularly child pornography, on the Internet and child access to it. Defines pornographic material and child pornography, discusses its commercial and noncommercial uses and the responsibility for child access, and presents solutions: content tagging; CyberAngels, a volunteer group created by the…
Descriptors: Access to Information, Computer Software, Internet, Law Enforcement
Peer reviewed Peer reviewed
Oppenheim, Charles; And Others – Journal of Information Science, 1995
Examines legal issues important to the library and information sector of the European Union. Discusses European Commission directives on length of copyright term, software, renting and lending, and database copyright. Reports on the Magill case on copyright in, and abuse of dominant position by, the copyright owners of television listings.…
Descriptors: Computer Software, Copyrights, Databases, Information Industry
Previous Page | Next Page ยป
Pages: 1  |  2