NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Peek, Robin – Proceedings of the ASIS Mid-Year Meeting, 1992
This extended abstract summarizes the findings of a study that examined nine scholar-focused public electronic discussion groups (EDGs) on BITNET. The roles, rules, and responsibilities of EDG owners are discussed, and several suggestions for enhancing the relationship between the EDG owner and membership are offered. (MES)
Descriptors: Computer Networks, Electronic Mail, Ethics, Information Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Hendrix, Dean – portal: Libraries and the Academy, 2007
To assess their knowledge, use, and attitudes regarding peer-to-peer (P2P) applications, this study surveyed academic librarians (n = 162) via a mail-in survey. Correlations between the sample characteristics (age, gender, year of MLS, type of library job) and P2P knowledge, use, and attitudes were also explored. Overall, academic librarians…
Descriptors: Academic Libraries, Information Technology, Library Services, Ethics
Bennett, Elisabeth E. – Online Submission, 2007
This paper discusses a qualitative case study that addresses how an intranet can provide opportunities for learning about an organization's culture. Four primary findings are discussed with the study concluding that cultural knowledge is conveyed and renewed through an intranet in a learning process that emphasizes informal learning and…
Descriptors: Informal Education, Organizational Culture, Adult Learning, Case Studies
Sumner, Mary R. – Educom Review, 1996
A study at Southern Illinois University examined ethical decisions of college students using networked computer resources and compared student responses with ethical attitudes and behaviors of information technology practitioners. Participants were asked to respond to nine case studies based upon actual situations that occur in academic settings.…
Descriptors: Case Studies, College Students, Comparative Analysis, Computer Networks
Peer reviewed Peer reviewed
Joo, Jae-Eun – British Journal of Educational Technology, 1999
Investigates cultural issues that the Internet has introduced into classrooms, with illustrations of good practice to stimulate critical discussions among educators on ethical and cultural aspects of Internet use, including equality of access and participation for all people, and mutual respect for, and promotion of, underrepresented languages and…
Descriptors: Access to Computers, Computer Assisted Instruction, Computer Mediated Communication, Computer Networks