Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Security | 24 |
Legal Responsibility | 24 |
Higher Education | 10 |
Internet | 9 |
Privacy | 9 |
Computer Mediated… | 7 |
Educational Technology | 7 |
Computer Uses in Education | 6 |
Confidentiality | 6 |
Federal Legislation | 6 |
Compliance (Legal) | 5 |
More ▼ |
Source
Author
Basham, Matt | 1 |
Bertram, Burt | 1 |
Brown, Abbie | 1 |
Brown, David S. | 1 |
Corn, Michael | 1 |
Ennis-Cole, Demetria | 1 |
Fossey, Richard | 1 |
Foster, Andrea L. | 1 |
Green, Tim | 1 |
Hawke, Constance S. | 1 |
Lafee, Scott | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 7 |
Postsecondary Education | 5 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Location
Canada | 1 |
Pennsylvania | 1 |
Turkey | 1 |
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Student Right to Know and… | 1 |
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
Wheeler, Anne Marie; Bertram, Burt – American Counseling Association, 2019
This eighth edition provides a current and comprehensive discussion of counselors' legal and ethical responsibilities, an examination of state and federal laws as they relate to practice, and helpful risk management strategies. Attorney Nancy Wheeler and Burt Bertram, a private practitioner and counselor educator, offer real-world practical tips…
Descriptors: School Counselors, School Counseling, Legal Responsibility, Ethics
Tosun, Nilgün – International Journal of Curriculum and Instruction, 2021
After the World Health Organization declared COVID-19 a pandemic, universities in Turkey, like many other countries, began compulsory distance education in March. Most of the courses are conducted by distance education. Millions of students and academics have been involved in distance education through technologies enabled by the existing…
Descriptors: Foreign Countries, COVID-19, Pandemics, Distance Education
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Suppo, Chris A. – ProQuest LLC, 2013
The purpose of this study was to investigate digital citizenship in Pennsylvania public schools based on the responses of school leaders including superintendents, curriculum coordinators, and technology coordinators. This study examined the relationship between Pennsylvania school leader's beliefs and the implementation of digital citizenship…
Descriptors: Public Schools, Administrator Attitudes, Correlation, Educational Technology
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes how academic lobbyists are trying to decide whether to back a proposed bill that might shield universities from getting sued for electronic piracy, or to fight for a better deal. (EV)
Descriptors: Computer Security, Federal Legislation, Higher Education, Legal Responsibility
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Lesisko, Lee James – 2003
This study analyzes the controversy of software piracy in education. It begins with a real world scenario that presents the setting and context of the problem. The legalities and background of software piracy are explained and true court cases are briefly examined. Discussion then focuses on explaining why individuals and organizations pirate…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Costs
Basham, Matt – Community College Journal, 2003
Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…
Descriptors: Civil Liberties, Community Colleges, Computer Security, Computers
Petersen, Rodney – EDUCAUSE Quarterly, 2004
The evolution of terms, such as computer security, network security, information security, and information assurance, appears to reflect a changing landscape, largely influenced by rapid developments in technology and the maturity of a relatively young profession and an emerging academic discipline. What lies behind the evolution of these terms?…
Descriptors: Educational Technology, Higher Education, Information Technology, Vocabulary Development
Lawhon, Tommie; Ennis-Cole, Demetria; Lawhon, David C. – Community College Journal of Research & Practice, 2006
Practical information on the necessity for community colleges, instructors, and students to understand and abide by the copyright laws is essential. Whether developing, structuring, maintaining, or presenting courses, or instructing students on the development of their own papers, one must be knowledgeable about plagiarism, the Fair Use Act, and…
Descriptors: Copyrights, Plagiarism, Distance Education, Community Colleges
Lafee, Scott – School Administrator, 2005
In an era of digital technologies, school districts find themselves on a cutting edge, one that slices both ways. Technological tools like the Internet, e-mail, networked computers and such have revolutionized the way children are taught and schools are run, but they also have created new management challenges and ethical issues that many school…
Descriptors: Educational Technology, Computer Uses in Education, Computer Security, Ethics
Previous Page | Next Page »
Pages: 1 | 2