Publication Date
| In 2026 | 0 |
| Since 2025 | 20 |
| Since 2022 (last 5 years) | 66 |
| Since 2017 (last 10 years) | 109 |
| Since 2007 (last 20 years) | 209 |
Descriptor
Source
Author
| Jenay Robert | 3 |
| Martin, Florence | 3 |
| Almes, Guy T. | 2 |
| Berson, Ilene R. | 2 |
| Berson, Michael J. | 2 |
| Corn, Michael | 2 |
| Florence Martin | 2 |
| Foster, Andrea L. | 2 |
| Gezer, Tuba | 2 |
| Grush, Mary | 2 |
| Jamie Reeves | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Canada | 7 |
| Turkey | 7 |
| United Kingdom | 5 |
| United States | 5 |
| Australia | 4 |
| California | 4 |
| Massachusetts | 4 |
| North Carolina | 4 |
| Ohio | 4 |
| Pennsylvania | 4 |
| Brazil | 3 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedSmith, Bruce; Fraser, Bruce T.; McClure, Charles R. – Journal of Academic Librarianship, 2000
Considers selected policy instruments related to federal agencies' deployment of information in a Web environment in terms of five key policy areas: access, security, privacy, intellectual property, and records management. Suggests that there are a significant number of policy instruments affecting federal Web site development. Identifies the need…
Descriptors: Access to Information, Computer Security, Document Delivery, Government Publications
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Berson, Ilene R.; Berson, Michael J. – Social Education, 2006
Internet users continue to develop new ways of communicating online and disseminating information; one of these methods, the blog, also known as web log, has become a significant cultural phenomenon. Blogs offer an interactive medium for internet users to create and contribute content to the web. In some social studies classrooms, teachers are…
Descriptors: Social Studies, Current Events, Internet, Web Sites
Direct Marketing Association, Washington, DC. – 1997
The ability to meet people, visit places around the globe, and make purchases online has added a new dimension to teaching children about the opportunities and accompanying risks that exist in everyday life. The Direct Marketing Association has created this guide to information use, behavior, and privacy on the Internet to help parents supervise…
Descriptors: Computer Attitudes, Computer Security, Electronic Mail, Information Industry
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Shih, Timothy; Hung, Jason – Information Science Publishing, 2007
Future Directions in Distance Learning and Communication Technologies presents theoretical studies and practical solutions for engineers, educational professionals, and graduate students in the research areas of e-learning, distance education, and instructional design. This book provides readers with cutting-edge solutions and research directions…
Descriptors: Electronic Learning, Distance Education, Instructional Design, Privacy
Lorenzen, Elizabeth A., Ed. – 1996
This book contains 11 papers examining career planning and job searching in the information age. The following papers are included: "The Librarian's Role in the Job Search of the Future: Issues and Ethics in the Electronic Environment" (Elizabeth A. Lorenzen); "The Internet as Career, Job, and Employment Resource: Transition, Assimilation,…
Descriptors: Career Education, Career Planning, Computer Security, Ethics
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Krunic, Tanja; Ruzic-Dimitrijevic, Ljiljana; Petrovic, Branka; Farkas, Robert – Journal of Information Technology Education, 2006
The Advanced Technical School from Novi Sad set up a completely new study group for web design in 2004. The main goals of the paper are to explain the steps that were taken in starting this group, and to present the educational program based on our own research through the organization of the group and course descriptions. Since there is a…
Descriptors: Investigations, Prior Learning, Course Descriptions, Internet
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security
Wright, Peter W. – 2000
Based on the author's presentation at the International Conference on Computer Based Learning in Science, this paper discuses some high profile areas of interest and concern in the educational use of information and communication technology (ICT). The paper is influenced partly by a series of nine government funded "Best Practices"…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Distance Education
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers

Direct link
