Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
College Students | 4 |
Computer Security | 4 |
Law Enforcement | 4 |
Higher Education | 3 |
Crime | 2 |
Administrative Policy | 1 |
Case Studies | 1 |
Class Activities | 1 |
Computer Science | 1 |
Computer Science Education | 1 |
Computer Software | 1 |
More ▼ |
Author
Davis, Martin H., Jr. | 1 |
Duffy, Kevin P. | 1 |
Fisher, Bonnie S., Ed. | 1 |
Monfils, Barbara | 1 |
Sethi, Vikram | 1 |
Sloan, John J., III, Ed. | 1 |
Wanat, Thomas | 1 |
Publication Type
Journal Articles | 2 |
Books | 1 |
Collected Works - General | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Higher Education Act Title IX | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Fisher, Bonnie S., Ed.; Sloan, John J., III, Ed. – Charles C. Thomas, Publisher, Ltd, 2022
This new edition of "Campus Crime" shares with readers the advancements that have been made in understanding campus crime. Across the three sections of the book, chapters review changes while also addressing current -- and even future -- crime and security issues confronting institutions of higher education. Some of these chapters…
Descriptors: Crime, Higher Education, Victims of Crime, Sexual Abuse
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime
Monfils, Barbara – 1993
As more people become computer literate, issues of privacy become more pertinent. Major privacy issues at the individual, national, and international levels are identified in the first part of the paper. These issues provide the basis for the second part of the paper, which is a report of a survey in which subjects were asked to indicate whether…
Descriptors: College Students, Computer Security, Confidential Records, Higher Education