Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Computer Software | 3 |
Legal Responsibility | 3 |
Computer Uses in Education | 2 |
Educational Technology | 2 |
Access to Computers | 1 |
College Administration | 1 |
Compliance (Legal) | 1 |
Computer Mediated… | 1 |
Computers | 1 |
Confidential Records | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Lesisko, Lee James – 2003
This study analyzes the controversy of software piracy in education. It begins with a real world scenario that presents the setting and context of the problem. The legalities and background of software piracy are explained and true court cases are briefly examined. Discussion then focuses on explaining why individuals and organizations pirate…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Costs
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers