NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Universal Declaration of…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pentang, Jupeth T. – Online Submission, 2021
Globalizations across organizations are impacted by economic, political, legal, security, social, cultural, ecological, and technological dimensions among others. This paper presents the readings from relevant articles and studies pertaining to the relationship between technology and its dimensions with globalization. Globalization and…
Descriptors: Global Approach, Technology Education, Technology Uses in Education, Educational Trends
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Peer reviewed Peer reviewed
Direct linkDirect link
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawrence, Cameron; Olson, Garrett; Douma, Bambi – Information Systems Education Journal, 2015
The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…
Descriptors: Information Security, Computer Security, Global Approach, Travel
Peer reviewed Peer reviewed
Direct linkDirect link
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Bartram, Dave – International Journal of Testing, 2006
The Internet has opened up a whole new set of opportunities for advancing the science of psychometrics and the technology of testing. It has also created some new challenges for those of us involved in test design and testing. In particular, we are seeing impacts from internationalization of testing and new models for test delivery. These are…
Descriptors: Internet, Testing, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Smith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Peer reviewed Peer reviewed
Direct linkDirect link
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2007
The Eighth Annual EDUCAUSE Current Issues Survey asked campus information technology leaders to rate the most critical IT challenges facing them, their campuses, and/or their systems. Four findings associated with all respondents to this year's survey merit special mention. First, for the 2007 survey, the CIC decided to split a key issue choice…
Descriptors: Information Systems, Information Technology, Computer Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Kleinwachter, Wolfgang – E-Learning, 2006
This article addresses issues central to the task of Internet governance and, especially, to the management of the Internet's core resources. Early conceptions of the Internet as a virtual space that required no regulation resisted initial governance activity. More recently, work by people like Lawrence Lessig has clarified the complex…
Descriptors: Internet, Public Policy, Governance, Misconceptions
Peer reviewed Peer reviewed
Direct linkDirect link
International Journal of Testing, 2006
Developed by the International Test Commission, the International Guidelines on Computer-Based and Internet-Delivered Testing are a set of guidelines specifically developed to highlight good practice issues in relation to computer/Internet tests and testing. These guidelines have been developed from an international perspective and are directed at…
Descriptors: Guidelines, Computer Assisted Testing, Internet, Test Construction