Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Crime | 8 |
Computer Uses in Education | 7 |
Computer Security | 4 |
Computer Mediated… | 3 |
Case Studies | 2 |
Educational Technology | 2 |
Ethics | 2 |
Foreign Countries | 2 |
Information Technology | 2 |
Internet | 2 |
School Security | 2 |
More ▼ |
Source
International Journal for… | 2 |
Classroom Computer Learning | 1 |
College Teaching Methods &… | 1 |
Education in Science | 1 |
Educause Quarterly | 1 |
Online Submission | 1 |
T.H.E. Journal | 1 |
Author
Leinbach, Carl | 2 |
Brown, David S. | 1 |
Dorling, Mark | 1 |
Frolick, Mark N. | 1 |
Jackson, Robert | 1 |
Johnstone, Emm | 1 |
Leinbach, Patricia | 1 |
Ramaswami, Rama | 1 |
Scrogan, Len | 1 |
Wang, Tao | 1 |
Wyne, Mudasser F. | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 8 |
Education Level
Elementary Secondary Education | 2 |
High Schools | 2 |
Higher Education | 2 |
Elementary Education | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Policymakers | 1 |
Practitioners | 1 |
Location
United Kingdom (London) | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
Dorling, Mark; Johnstone, Emm – Education in Science, 2012
The popularity of forensic science in schools continues to grow alongside the proportion of prime time scheduling devoted to CSI television shows. Yet the understanding of how forensic tests are used in narrowing down a field of possible suspects to the point where just one can be arrested or taken to trial is far less well understood. Students…
Descriptors: Computer Uses in Education, Databases, Educational Technology, Information Technology
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Leinbach, Carl – International Journal for Technology in Mathematics Education, 2011
This article will expand upon the techniques of Criminologist, D. Kim Rossmo, and Social Psychologist, David Canter for determining a serial criminal's base of operations. The basic framework for our investigation is that of Rossmo, but uses a different criterion for analysing the relationship of points within the hunting area defined by the crime…
Descriptors: Crime, School Security, Serial Ordering, Criminals
Leinbach, Patricia; Leinbach, Carl – International Journal for Technology in Mathematics Education, 2010
In this paper, we are proposing the use of forensic case studies as a means to provide students with interesting problem solving opportunities that capitalise on the popularity of several TV series and shows. It also satisfies their natural curiosity about how answers are found to seemingly complex real life problems. We begin with a very brief…
Descriptors: Student Interests, Crime, Case Studies, Educational Technology
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education

Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Scrogan, Len – Classroom Computer Learning, 1988
Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)
Descriptors: Computer Literacy, Computer Networks, Computer Uses in Education, Crime