NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Practitioners1
Laws, Policies, & Programs
First Amendment1
Fourth Amendment1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Ruppert, Janet – ProQuest LLC, 2023
Teenagers today are coming of age under unprecedented, pervasive networks of institutional mass surveillance technologies. Surveillance technologies spreading in youth spaces are impacting young people's prospects today and are expected to continue in the future. Additionally, today's teenagers will be tomorrow's decision-makers, tasked with…
Descriptors: Social Justice, Observation, Telecommunications, Algorithms
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Dotinga, Randy – Chronicle of Higher Education, 2008
Tags such as the radio-frequency identifications or RFIDs are devices that make it possible for individuals to be tracked and their location reported back to a database. The devices--chips with radio antennas--emit signals, and tracking them reveals the movement of people or things. Many stores use the technology to catch shoplifters at exits. To…
Descriptors: Experiments, Privacy, Electromechanical Technology, State Universities
Krishnamurthy, Janaki – ProQuest LLC, 2010
Given the increasing competition in the software industry and the critical consequences of software errors, it has become important for companies to achieve high levels of software quality. While cost reduction and timeliness of projects continue to be important measures, software companies are placing increasing attention on identifying the user…
Descriptors: Program Evaluation, Opinions, Privacy, Prediction
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy
And Others; Tomeski, Edward A. – Personnel, 1978
As computers continue to play an increasingly greater role in all segments of society, both government and business must begin to more vigorously attack the human-related problems they create before these problems become entrenched and impossible to rectify. (Author)
Descriptors: Civil Liberties, Computer Science, Databases, Personnel Management
Powers, David E. – Creative Computing, 1980
A wide range of computer crimes and the need for computer security are discussed. (MK)
Descriptors: Computer Programs, Computer Science, Computer Storage Devices, Computers
Peer reviewed Peer reviewed
Virunurm, Valdeko; Gaunt, Roger N. – New Directions for Institutional Research, 1977
Sophisticated computer technology now allows for increasingly adaptable privacy safeguards. Various protection mechanisms are described, including password technology and encryption techniques, and administrative guidelines are offered. (Editor/LBH)
Descriptors: Computer Science, Confidential Records, Consumer Protection, Data Collection
Peer reviewed Peer reviewed
Reynolds, Roger – Environmentalist, 1983
Describes important information-handling products, predicting future devices in light of convergence and greater flexibility offered through use of microchip technology. Contends that information technology and its impact of privacy depends on how information systems are used, arguing that the privacy issue deals more with moral/physiological…
Descriptors: Computer Science, Computers, Data, Environmental Education
Kerr, Stephen T. – 1983
This four-section paper begins with a brief description of videotex and the paths its development has followed during its short lifespan. The second section examines how videotex systems should present and display information, and how such information should be internally organized so that it is maximally useful for the reader/user. The analysis,…
Descriptors: Computer Graphics, Computer Science, Design Requirements, Display Systems
Linowes, David F. – 1979
There is increasing conflict between the individual's right to privacy and the need for information about individuals by private and governmental institutions; these opposing forces need to be balanced. Two phenomena which have exacerbated this problem are the rapid advances in computer technology and the increasing demands of the individual on…
Descriptors: Business Responsibility, Civil Liberties, Computer Science, Confidential Records
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1981
A general introduction to computer based national information systems, and the context and basis for future studies are provided in this report. Chapter One, the introduction, summarizes computers and information systems and their relation to society, the structure of information policy issues, and public policy issues. Chapter Two describes the…
Descriptors: Administration, Computer Science, Computers, Data Processing
Previous Page | Next Page ยป
Pages: 1  |  2