Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Chronicle of Higher Education | 1 |
Information Systems Education… | 1 |
Journal of Business and… | 1 |
Journal of Cybersecurity… | 1 |
Social Studies | 1 |
Author
Howard, Elizabeth V. | 1 |
Joseph Frusci | 1 |
Kruger, Robert | 1 |
Olson, Gary A. | 1 |
Redmann, Donna H., Ed. | 1 |
Woods, David M. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Collected Works - Serials | 1 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail
Kruger, Robert – Social Studies, 2003
As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…
Descriptors: Ethics, Middle School Students, Computer Security, Elementary School Students
Redmann, Donna H., Ed. – Journal of Business and Training Education, 1999
This issue contains eight articles on a wide variety of topics in business and training education. "Ethics and beyond: Enhancing Communication and Critical Thinking Skills through Ethics Instruction" (Sandra A. Howard) offers strategies for incorporating ethics instruction in the business curriculum that can also enhance students'…
Descriptors: Adult Education, Business Correspondence, Business Education, Communication Skills