Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
Author
Publication Type
Education Level
Higher Education | 6 |
Postsecondary Education | 2 |
Audience
Practitioners | 4 |
Administrators | 2 |
Media Staff | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Copyright Law 1976 | 2 |
Digital Millennium Copyright… | 2 |
Family Educational Rights and… | 1 |
Freedom of Information Act | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Lipka, Sara – Chronicle of Higher Education, 2009
Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…
Descriptors: Music, Industry, Hearings, Copyrights
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Valenza, Joyce Kasman; Johnson, Doug – School Library Journal, 2009
The library, as we once knew it, may no longer be relevant. And, yet, this is undoubtedly the most exciting time in history to be a librarian. The future of the school library as a relevant and viable institution is largely dependent on librarians and how quickly they respond to change. They worry about their field and their practice. They worry…
Descriptors: Intellectual Freedom, Intellectual Property, Computers, School Libraries
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Avram, Henriette D. – EDUCOM Review, 1989
Description of the Library of Congress' Networking Advisory Committee focuses on recommendations it has made concerning issues pertinent to intellectual property in an information network environment. Alternatives to the present Copyright Act are examined, the economics of sharing information are discussed, and questions involving databases and…
Descriptors: Computer Networks, Copyrights, Databases, Information Networks
Lyons, Patrice A. – Bulletin of the American Society for Information Science, 1998
Discusses the use of computer networking such as the Internet for the creation and dissemination of copyright works. Topics include the need for data structures for organizing and identifying units of digital information; and the copyright status of original works of authorship structured as digital objects. (LRW)
Descriptors: Access to Information, Computer Networks, Copyrights, Information Dissemination
Foster, Andrea L. – Chronicle of Higher Education, 2005
U.S. Supreme Court justices struggled in a lively debate with how to balance the competing interests of the entertainment industry and developers of file-sharing technology. Some justices sharply questioned whether it was fair to hold inventors of a distribution technology liable for copyright infringement, while others suggested that it was wrong…
Descriptors: Copyrights, Computer Networks, Court Litigation, Hearings
Hendrix, Dean – portal: Libraries and the Academy, 2007
To assess their knowledge, use, and attitudes regarding peer-to-peer (P2P) applications, this study surveyed academic librarians (n = 162) via a mail-in survey. Correlations between the sample characteristics (age, gender, year of MLS, type of library job) and P2P knowledge, use, and attitudes were also explored. Overall, academic librarians…
Descriptors: Academic Libraries, Information Technology, Library Services, Ethics
Jacobson, Robert L. – Chronicle of Higher Education, 1995
Representatives of American publishers have agreed that an assertive new effort is needed to prevent unauthorized copying of electronic materials, particularly through computers linked to the World Wide Web. Copyright management systems are proposed as a means to provide protection for content of intellectual property and for on-line financial…
Descriptors: Computer Networks, Copyrights, Higher Education, Intellectual Property
Stueben, Suzy; Vockell, Edward L. – Educational Technology, 1993
Discusses microcomputer-based reformatting of text to help learners with disabilities. Highlights include letter size; spacing; copyright problems; expanding the target audience to make systems more cost effective; writing skills; voice input; and further enhancements, including networked systems and the use of hypertext. (14 references) (LRW)
Descriptors: Computer Networks, Copyrights, Cost Effectiveness, Hypermedia
Reed, Peter – Internet World, 1995
Considers ethical questions related to the copying and use of information from World Wide Web sites, especially graphics. Copyright violation, control of distribution, commercial online users, problems of perception, asking permission, and standards of ethical behavior are discussed. (LRW)
Descriptors: Computer Graphics, Computer Networks, Copyrights, Ethics
Barbour, Andrew – Electronic Learning, 1987
Describes Electronic Software Delivery System (ESDS), which allows teachers in the Los Angeles Unified School District to access and preview software stored at a central location. Hardware used in the system is explained, and security of programs stored on the system is emphasized as the key to its success. (LRW)
Descriptors: Computer Networks, Computer Software Reviews, Copyrights, Courseware
St. Lifer, Evan – Library Journal, 1997
Since its founding in 1990, the Coalition for Networked Information (CNI) has focused on publishing and accessing intellectual property. This article presents an interview with CNI's new executive director, Cliff Lynch discussing future changes, scholarly communication and the Internet, the University of California Berkeley's MELVYL, computer…
Descriptors: Computer Networks, Computer Science, Copyrights, Intellectual Property