NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Fisher, Bonnie S., Ed.; Sloan, John J., III, Ed. – Charles C. Thomas, Publisher, Ltd, 2022
This new edition of "Campus Crime" shares with readers the advancements that have been made in understanding campus crime. Across the three sections of the book, chapters review changes while also addressing current -- and even future -- crime and security issues confronting institutions of higher education. Some of these chapters…
Descriptors: Crime, Higher Education, Victims of Crime, Sexual Abuse
Peer reviewed Peer reviewed
Direct linkDirect link
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime
Monfils, Barbara – 1993
As more people become computer literate, issues of privacy become more pertinent. Major privacy issues at the individual, national, and international levels are identified in the first part of the paper. These issues provide the basis for the second part of the paper, which is a report of a survey in which subjects were asked to indicate whether…
Descriptors: College Students, Computer Security, Confidential Records, Higher Education