Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 8 |
Policy Formation | 8 |
Guidelines | 5 |
Internet | 5 |
Privacy | 4 |
Ethics | 3 |
Higher Education | 3 |
Information Technology | 3 |
Access to Information | 2 |
College Administration | 2 |
Computer Networks | 2 |
More ▼ |
Source
EDUCAUSE Quarterly | 2 |
Computers & Education | 1 |
Consortium for School… | 1 |
Journal of Instruction… | 1 |
Library Trends | 1 |
Online Libraries and… | 1 |
Online Submission | 1 |
Author
Gavitt, Donna R. | 1 |
Littman, Marlyn Kemper | 1 |
Neray, Phil | 1 |
Olivo, John J. | 1 |
Oxley, Alan | 1 |
Perks, Dennis J. | 1 |
Qayoumi, Mohammad H. | 1 |
Smith, Martha | 1 |
Woody, Carol | 1 |
Wyne, Mudasser F. | 1 |
Publication Type
Reports - Descriptive | 8 |
Journal Articles | 7 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Location
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Consortium for School Networking (NJ1), 2011
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Descriptors: Safety, Laws, School Districts, Internet
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication

Smith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses Internet access and monitoring in light of H. G. Wells' idea of a world brain or encyclopedia, or mind of the species. Topics include the evolution and effects of Internet access, including employee productivity, network bandwidth, and legal liabilities or negative publicity; and Internet usage and security policy. (LRW)
Descriptors: Access to Computers, Access to Information, Computer Security, Internet
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education

Perks, Dennis J.; Gavitt, Donna R.; Olivo, John J. – Computers & Education, 1997
Developing an Internet acceptable use policy is the first step in bringing technological change to the classroom. This article defines educator's proactive responsibilities and provides a policy shell (privilege, "netiquette," security, vandalism, legal issues, warranties, and user agreements) to formulate individual school policies.…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Guidelines
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy