NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
King, Kenneth M. – EDUCOM Bulletin, 1988
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
Descriptors: Computer Networks, Computer Software, Computer Uses in Education, Ethics
Ryland, Jane – CAUSE/EFFECT, 1989
An overview of responses from a number of higher education associations (ACE, EDUCOM and NASULGC, and Cornell University) to the controversial issues that have arisen from the 1988 Internet "worm" are presented. Preliminary results from a CAUSE survey of higher education institutions are discussed. (Author/MLW)
Descriptors: Computer Networks, Computer Software, Databases, Ethics
Peer reviewed Peer reviewed
Lynn, M. Stuart – Educational Record, 1989
The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)
Descriptors: Computer Networks, Computer Software, Computers, Ethics
Markoff, John – EDUCOM Review, 1994
Discusses intelligent software agents, or knowledge robots (knowbots), and the impact they have on the Internet. Topics addressed include ethical dilemmas; problems created by rapid growth on the Internet; new technologies that are amplifying growth; and a shift to a market economy and resulting costs. (LRW)
Descriptors: Artificial Intelligence, Computer Networks, Computer Software, Costs
Peer reviewed Peer reviewed
Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks
McLaughlin, Pamela – 1992
This annotated bibliography is the sixth annual compilation of the abstracts of 228 documents added to the ERIC database during the year 1991 in the area of computer applications in elementary and secondary schools. The types of materials included are administrator guides, bibliographies, conference papers, evaluative reports, literature reviews,…
Descriptors: Abstracts, Adult Education, Annotated Bibliographies, Artificial Intelligence
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This September 10, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Why America Should Welcome Tariq Ramadan" (Wolfe, Alan; Zimbardo,…
Descriptors: Computer Networks, Higher Education, Religion, Cultural Awareness
McLaughlin, Pamela – 1992
This collection provides an overview of literature entered into the ERIC database in 1990 on computer applications in elementary and secondary education, adult education, and special education. The first of four sections contains a list of overview documents on computer assisted instruction. Focusing on special applications, the second section…
Descriptors: Abstracts, Adult Education, Annotated Bibliographies, Artificial Intelligence