Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 17 |
Descriptor
Computer Security | 29 |
Intellectual Property | 29 |
Internet | 13 |
Privacy | 13 |
Information Technology | 12 |
Copyrights | 8 |
Ethics | 8 |
Access to Information | 7 |
Information Security | 6 |
Foreign Countries | 5 |
Computer Mediated… | 4 |
More ▼ |
Source
Author
Akcay, Behiye | 1 |
Bachman, Dale J. | 1 |
Beaudet, Michael | 1 |
Brooks, Rochelle | 1 |
Brown, Ezra A. | 1 |
Chithambo, Loyce Maosa | 1 |
Clapper, Danial L. | 1 |
Cleveland, Lara L. | 1 |
Duberman, Josh | 1 |
Ely, Donald P. | 1 |
Ford, Janet C. | 1 |
More ▼ |
Publication Type
Journal Articles | 22 |
Reports - Descriptive | 17 |
Reports - Evaluative | 5 |
Reports - Research | 4 |
Dissertations/Theses -… | 2 |
Books | 1 |
Guides - Non-Classroom | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 6 |
Adult Education | 1 |
Early Childhood Education | 1 |
Elementary Secondary Education | 1 |
Audience
Policymakers | 2 |
Administrators | 1 |
Practitioners | 1 |
Students | 1 |
Location
China | 3 |
United States | 2 |
Australia | 1 |
Brunei | 1 |
Burma | 1 |
India | 1 |
Indonesia | 1 |
Kansas | 1 |
Malaysia | 1 |
New Zealand | 1 |
Pennsylvania | 1 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
UNESCO Bangkok, 2015
The proliferation and emergence of information and communications technology (ICT) has fundamentally changed the way in which society operates. The increasingly ubiquitous nature of ICT has also inevitably caused it to become indispensable as part of daily life and a basic building block of modern society. When used effectively and appropriately,…
Descriptors: Information Technology, Foreign Countries, Computer Security, Internet
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Chithambo, Loyce Maosa – ProQuest LLC, 2011
Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…
Descriptors: Information Technology, Teleworking, Information Security, Computer Security
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Chronicle of Higher Education, 2008
As new technologies emerge on campuses, how can colleges avoid legal land mines? What are the areas of greatest risk, and how should higher-education leaders deal with them? In this article, three experts offered their advice at the Technology Forum: Beth Cate, associate general counsel at Indiana University, on data privacy and security; Steven…
Descriptors: Intellectual Property, College Faculty, Higher Education, Legal Problems
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Akcay, Behiye – Turkish Online Journal of Distance Education, 2008
The purpose of this study is to discuss the ethical issues in education in terms of teachers, students, schools, and software companies. Recent growth of the internet and World Wide Web allows new developments in the way instructors transfer knowledge to their students. Technology is a new tool in education that constantly changes and offers new…
Descriptors: Educational Technology, Internet, Ethics, Computer Security
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Previous Page | Next Page ยป
Pages: 1 | 2