Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 5 |
Computer Security | 5 |
Copyrights | 5 |
Internet | 4 |
Privacy | 3 |
Ethics | 2 |
Freedom of Speech | 2 |
Higher Education | 2 |
Information Technology | 2 |
Access to Information | 1 |
Artificial Intelligence | 1 |
More ▼ |
Author
Battisti, F. | 1 |
Boato, G. | 1 |
Brown, Joan Marie | 1 |
Carli, M. | 1 |
Connolly, Mary V. | 1 |
Hawke, Constance S. | 1 |
Neri, A. | 1 |
Rosenblatt, Joel | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Books | 1 |
Guides - Classroom - Teacher | 1 |
Guides - Non-Classroom | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Audience
Practitioners | 1 |
Students | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Brown, Joan Marie – Learning & Leading with Technology, 1997
Describes four open-ended activities for students in grades 4-12 designed to encourage thought, discussion, and decision making in classes dealing with issues in ethics and technology. Provides teacher directions, describes activities, and outlines debriefing sessions for lessons in copyright infringement, network security, artificial…
Descriptors: Artificial Intelligence, Class Activities, Computer Networks, Computer Security
Connolly, Mary V. – 1997
The Internet is a network of networks, sharing the same protocol and linking universities, research communities, businesses, and individuals world wide. In this new global information infrastructure, all citizens need to understand the power and pitfalls of the technology in order to function as responsible members. This paper discusses issues…
Descriptors: Access to Information, Computer Networks, Computer Security, Copyrights
Hawke, Constance S. – 2001
The purpose of this book is threefold: (1) to inform Internet users of the legal ramifications of their on-line activities; (2) to help administrators handle specific situations or complaints regarding Internet activity; and (3) to provide guidance for the formulation of acceptable computer use policies on campuses. The chapters are: chapter 1,…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Copyrights