Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 5 |
Ethics | 5 |
Models | 5 |
Information Technology | 2 |
Intellectual Property | 2 |
Policy Formation | 2 |
Privacy | 2 |
Audiences | 1 |
Behavior Standards | 1 |
Business Administration… | 1 |
Business Schools | 1 |
More ▼ |
Source
EDUCAUSE Quarterly | 1 |
Journal of Education for… | 1 |
Learning & Leading with… | 1 |
Library Trends | 1 |
Online Submission | 1 |
Author
Campbell, John P. | 1 |
Carpenter, Cal | 1 |
Oblinger, Diana G. | 1 |
Smith, Martha | 1 |
Wyne, Mudasser F. | 1 |
Yang, Samuel C. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Carpenter, Cal – Learning & Leading with Technology, 1996
Considers ethics issues involved with using online resources like the Internet in elementary and secondary education and suggests that educators initiate and model a standardized role of ethical behavior for Internet users. Topics include hackers; privacy, piracy, and security; screening electronic sites; ethics education; and an ethics model.…
Descriptors: Computer Security, Elementary Secondary Education, Ethics, Internet

Smith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Campbell, John P.; Oblinger, Diana G. – EDUCAUSE Quarterly, 2007
The EDUCAUSE Advisory Committee for Teaching and Learning (ACTL) has identified the key technology-related teaching and learning issues in higher education for 2007. The 10 important teaching and learning issues are: (1) Establishing and supporting a culture of evidence; (2) Demonstrating improvement of learning; (3) Translating learning…
Descriptors: College Instruction, Validity, Educational Improvement, Theory Practice Relationship