Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Networks | 10 |
Computer Software | 10 |
Privacy | 10 |
Information Technology | 6 |
Internet | 5 |
Access to Information | 4 |
Computers | 4 |
Foreign Countries | 4 |
Higher Education | 4 |
Access to Computers | 3 |
College Students | 3 |
More ▼ |
Source
Author
Almeroth, Kevin | 1 |
Bristow, Rob | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Diamond, Ted | 1 |
Dodds, Ted | 1 |
Gil-Garcia, J. Ramon | 1 |
McCollum, Roy | 1 |
Northam, Richard | 1 |
Plugge, Leo | 1 |
Tanner, Maureen | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Australia | 2 |
Netherlands | 2 |
United Kingdom | 2 |
Arkansas | 1 |
Asia | 1 |
Brazil | 1 |
Canada | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection

Wiggins, Rich – Public-Access Computer Systems Review, 1993
Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…
Descriptors: Access to Information, Computer Networks, Computer Software, Electronic Publishing

Diamond, Ted – Internet Research, 1994
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
Descriptors: Algorithms, Civil Liberties, Coding, Computer Networks
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
OECD Publishing (NJ1), 2006
The development of digital content raises new issues as rapid technological developments challenge existing business models and government policies. This OECD study identifies and discusses six groups of business and public policy issues and illustrates these with existing and potential OECD Digital Content Strategies and Policies: (1) Innovation…
Descriptors: Intellectual Property, Job Skills, Job Training, Foreign Countries
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers