NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Filmer, Paul E. – Library Hi Tech, 1995
Addresses concerns associated with the evolving National Information Infrastructure, including navigation; electronic bulletin board arrangements, including kiosks or sandboxes; electronic journals and electronic publishing; copyright issues, including liability issues associated with software or downloaded data; privacy rights; and collaboration…
Descriptors: Computer Software, Copyrights, Downloading, Electronic Journals
Peer reviewed Peer reviewed
Johnson, Deborah G. – Journal of Social Issues, 1984
Argues that philosophical, ethical analysis is needed when the moral rules relevant to a situation (such as the use of computers) are not obvious, or when several moral principles come into conflict. In this context, examines rights of ownership of computer programs, and the effects of increasing computer use on privacy and power. (Author/KH)
Descriptors: Codes of Ethics, Computer Software, Computers, Ethics
Amidon, Paige – Online, 1992
Discusses privacy concerns relating to electronic information media. European privacy initiatives from the European Community are described, including personal data protection, impact on the online industry, and telecommunications privacy; and activities in the United States are examined, including telephone caller privacy, electronic mail…
Descriptors: Computer Software, Confidential Records, Electronic Mail, Foreign Countries
Miller, Jerry P. – Library Journal, 1994
Describes results of a survey of librarians conducted using the Internet, regarding their attitudes toward electronic mail and networking. Topics addressed include software; the effect on job descriptions; privacy issues; use in academic libraries; navigation problems; discussion groups; and perceived value. A sidebar discusses network etiquette.…
Descriptors: Academic Libraries, Computer Software, Electronic Mail, Higher Education
Peer reviewed Peer reviewed
Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks
Sivin, Jay P.; Bialo, Ellen R. – 1992
In response to the rapid growth of computer crime and such illegitimate practices as piracy and fraud, the National Institute of Justice and the Office for Educational Research and Improvement have formed a partnership to promote school programs on the ethical uses of new technologies. This report, the first of the partnership, is designed to…
Descriptors: Computer Software, Curriculum Development, Educational Technology, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
OECD Publishing (NJ1), 2006
The development of digital content raises new issues as rapid technological developments challenge existing business models and government policies. This OECD study identifies and discusses six groups of business and public policy issues and illustrates these with existing and potential OECD Digital Content Strategies and Policies: (1) Innovation…
Descriptors: Intellectual Property, Job Skills, Job Training, Foreign Countries