NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dorling, Mark; Johnstone, Emm – Education in Science, 2012
The popularity of forensic science in schools continues to grow alongside the proportion of prime time scheduling devoted to CSI television shows. Yet the understanding of how forensic tests are used in narrowing down a field of possible suspects to the point where just one can be arrested or taken to trial is far less well understood. Students…
Descriptors: Computer Uses in Education, Databases, Educational Technology, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Leinbach, Carl – International Journal for Technology in Mathematics Education, 2011
This article will expand upon the techniques of Criminologist, D. Kim Rossmo, and Social Psychologist, David Canter for determining a serial criminal's base of operations. The basic framework for our investigation is that of Rossmo, but uses a different criterion for analysing the relationship of points within the hunting area defined by the crime…
Descriptors: Crime, School Security, Serial Ordering, Criminals
Peer reviewed Peer reviewed
Direct linkDirect link
Leinbach, Patricia; Leinbach, Carl – International Journal for Technology in Mathematics Education, 2010
In this paper, we are proposing the use of forensic case studies as a means to provide students with interesting problem solving opportunities that capitalise on the popularity of several TV series and shows. It also satisfies their natural curiosity about how answers are found to seemingly complex real life problems. We begin with a very brief…
Descriptors: Student Interests, Crime, Case Studies, Educational Technology
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Peer reviewed Peer reviewed
Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Scrogan, Len – Classroom Computer Learning, 1988
Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)
Descriptors: Computer Literacy, Computer Networks, Computer Uses in Education, Crime