Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 5 |
Computers | 5 |
College Students | 3 |
Information Technology | 3 |
College Faculty | 2 |
College Instruction | 2 |
Computer Software | 2 |
Information Security | 2 |
Internet | 2 |
Telecommunications | 2 |
Access to Information | 1 |
More ▼ |
Source
Association of Small Computer… | 1 |
Black Issues in Higher… | 1 |
Contemporary Issues in… | 1 |
OCLC Online Computer Library… | 1 |
Author
Belon, Barbara | 1 |
Brooks, Rochelle | 1 |
Cossey, David | 1 |
Goldsborough, Reid | 1 |
Storey, Tom, Ed. | 1 |
Wright, Marie | 1 |
Publication Type
Reports - Evaluative | 5 |
Journal Articles | 2 |
Speeches/Meeting Papers | 2 |
Numerical/Quantitative Data | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
Canada | 1 |
France | 1 |
Germany | 1 |
Japan | 1 |
United Kingdom | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Goldsborough, Reid – Black Issues in Higher Education, 2004
"Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…
Descriptors: Computer Security, Computers, Fear, Computer Security
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Cossey, David – Association of Small Computer Users in Education (ASCUE), 2005
Small colleges have unique challenges with respect to their information technology environments. It is easy to forget sometimes that small colleges are not simply small big colleges, and that IT needs to be considered in a particular way, especially because of its associated costs. For one thing, the senior administration at a small college may be…
Descriptors: Information Technology, Small Colleges, Telecommunications, Computers
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Belon, Barbara; Wright, Marie – 2002
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
Descriptors: College Curriculum, College Instruction, Community Colleges, Computer Science