Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 9 |
Since 2006 (last 20 years) | 27 |
Descriptor
Computer Security | 37 |
Ethics | 37 |
Internet | 18 |
Privacy | 14 |
Information Technology | 9 |
Information Security | 8 |
Computer Software | 7 |
Computer Uses in Education | 7 |
Computer Networks | 6 |
Access to Information | 5 |
Crime | 5 |
More ▼ |
Source
Author
Alina A. von Davier | 1 |
Bailey, Gerald D. | 1 |
Becker, Benjamin | 1 |
Ben-Jacob, Marion G. | 1 |
Bertram, Burt | 1 |
Brown, David S. | 1 |
Campbell, John P. | 1 |
Carpenter, Cal | 1 |
Cesarini, Paul | 1 |
Clouse, Shawn | 1 |
Connolly, Mary V. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 37 |
Journal Articles | 31 |
Books | 2 |
Guides - Classroom - Teacher | 2 |
Guides - Non-Classroom | 1 |
Reference Materials -… | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 15 |
Postsecondary Education | 9 |
Elementary Secondary Education | 3 |
High Schools | 2 |
Middle Schools | 2 |
Elementary Education | 1 |
Secondary Education | 1 |
Audience
Administrators | 2 |
Teachers | 2 |
Policymakers | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Universal Declaration of… | 1 |
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Jiangang Hao; Alina A. von Davier; Victoria Yaneva; Susan Lottridge; Matthias von Davier; Deborah J. Harris – Educational Measurement: Issues and Practice, 2024
The remarkable strides in artificial intelligence (AI), exemplified by ChatGPT, have unveiled a wealth of opportunities and challenges in assessment. Applying cutting-edge large language models (LLMs) and generative AI to assessment holds great promise in boosting efficiency, mitigating bias, and facilitating customized evaluations. Conversely,…
Descriptors: Evaluation Methods, Artificial Intelligence, Educational Change, Computer Software
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
ETS Research Institute, 2024
ETS experts are exploring and defining the standards for responsible AI use in assessments. A comprehensive framework and principles will be unveiled in the coming months. In the meantime, this document outlines the critical areas these standards will encompass, including the principles of: (1) Fairness and bias mitigation; (2) Privacy and…
Descriptors: Artificial Intelligence, Computer Assisted Testing, Educational Testing, Ethics
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Karst, Nathaniel; Slegers, Rosa – PRIMUS, 2019
Many of the applied mathematics courses we teach touch upon a range of rich and important ethical issues -- issues that, for a number of reasons, are rarely openly discussed in class. In this work, we describe a sequence of activities co-designed and co-taught by philosophy and mathematics faculty in the hopes of bridging the divide between the…
Descriptors: Team Teaching, Ethics, Mathematics Instruction, Technology
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Item Order and Speededness: Implications for Test Fairness in Higher Educational High-Stakes Testing
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Wheeler, Anne Marie; Bertram, Burt – American Counseling Association, 2019
This eighth edition provides a current and comprehensive discussion of counselors' legal and ethical responsibilities, an examination of state and federal laws as they relate to practice, and helpful risk management strategies. Attorney Nancy Wheeler and Burt Bertram, a private practitioner and counselor educator, offer real-world practical tips…
Descriptors: School Counselors, School Counseling, Legal Responsibility, Ethics
Dittrich, David – Research Ethics, 2015
This paper considers some of the ethical issues surrounding the study of malicious activity in social networks, specifically using a technique known as "social honeypots" combined with the use of deception. This is a potentially touchy area of study that is common to social and behavioral research that is well understood to fall within…
Descriptors: Social Networks, Social Media, Ethics, Deception
White, Lawrence – Association of Governing Boards of Universities and Colleges, 2015
A principle responsibility of a board member is to understand the environment in which his or her institution operates. Today, that environment includes a host of legal risks that every institution of higher education must be prepared to assess and proactively address. Colleges and universities work to contain and manage those risks through such…
Descriptors: Legal Problems, Sexual Abuse, Student Behavior, Risk
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Ohler, Jason – Education Digest: Essential Readings Condensed for Quick Review, 2012
The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are proactive and aggressive. This will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age beckons a new era of…
Descriptors: Virtual Classrooms, Caring, Ethics, Personality