NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Peer reviewed Peer reviewed
McMurdo, George – Journal of Information Science, 1995
Presents 20 networking etiquette guidelines taken from electronic and print sources. Highlights include focusing on one subject, condensing messages, editing quotes, spelling and grammar, typography, mistakes, acronyms, humor, researching discussion groups, intellectual property and copyright, manners, ethics, and damage. (AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Copyrights, Editing
Johnson, Deborah G. – EDUCOM Review, 1994
Discusses computer ethics and the use of computer networks. Topics addressed include computer hackers; software piracy; computer viruses and worms; intentional and unintentional abuse; intellectual property rights versus freedom of thought; the role of information in a democratic society; individual privacy; legislation; social attitudes; and the…
Descriptors: Access to Information, Computer Networks, Democracy, Educational Needs
Denning, Dorothy E., Ed.; Lin, Herbert S., Ed. – 1994
This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services,…
Descriptors: Access to Information, Censorship, Computer Networks, Confidentiality