NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Smith, Peter, Ed. – Association of Small Computer Users in Education (ASCUE), 2009
The Association of Small Computer Users in Education (ASCUE) is a dynamic organization for people interested in small college technology issues. Its members include information technology professionals, instructional technologists, and faculty members from all over the world who use computers and technology to support teaching and learning. The…
Descriptors: Small Colleges, Information Technology, Educational Technology, Organizations (Groups)