Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Mediated… | 3 |
Computer Security | 3 |
Policy Formation | 3 |
Ethics | 2 |
Foreign Countries | 2 |
Information Technology | 2 |
Access to Computers | 1 |
Behavior | 1 |
Behavior Standards | 1 |
Citizenship Education | 1 |
Citizenship Responsibility | 1 |
More ▼ |
Author
Phillips, Bruce | 1 |
Wyne, Mudasser F. | 1 |
Publication Type
Journal Articles | 2 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Canada | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy

Phillips, Bruce – Canadian Journal of Information and Library Science, 1995
This lecture by the Privacy Commissioner of Canada addresses issues related to information technology and privacy, including privacy law, government role, surveillance techniques, and security measures to protect the privacy of electronic communications. The text of the question and answer period following the lecture is included. (MES)
Descriptors: Computer Mediated Communication, Computer Security, Federal Legislation, Foreign Countries