Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 4 |
Laws | 4 |
Ethics | 2 |
Information Security | 2 |
Privacy | 2 |
Technological Advancement | 2 |
Barriers | 1 |
Civil Rights | 1 |
Computer Uses in Education | 1 |
Educational Technology | 1 |
Electronic Mail | 1 |
More ▼ |
Source
Internet Research | 1 |
Journal of Broadcasting &… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Digital Learning… | 1 |
Author
Broderick, Martha A. | 1 |
Gibson, Virginia R. | 1 |
Pusey, Portia | 1 |
Sadera, William A. | 1 |
Sam Aiello | 1 |
Samoriski, Jan H. | 1 |
Tarasewich, Peter | 1 |
Publication Type
Journal Articles | 4 |
Reports - Evaluative | 4 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United States | 2 |
European Union | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws

Broderick, Martha A.; Gibson, Virginia R.; Tarasewich, Peter – Internet Research, 2001
In the United States, electronic signatures recently became as legally binding as printed signatures. Reviews the status of electronic signatures in the United States, and compares it to work done by the United Nations. Summarizes the technology that can be used to implement electronic signatures. Discusses problems and open issues surrounding the…
Descriptors: Computer Security, Federal Legislation, Information Technology, Laws

Samoriski, Jan H.; And Others – Journal of Broadcasting & Electronic Media, 1996
Attempts to clarify the status of e-mail privacy under the Electronic Communications Privacy Act of 1986 (ECPA). Examines current law and the paucity of definitive case law. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e-mail,…
Descriptors: Computer Security, Electronic Mail, Information Policy, Laws