NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Goode, Joanne; Johnson, Maggie – Online, 1991
Presents a summary of guidelines for the use of electronic mail (e-mail) and examines legal issues and existing law governing electronic communication. The Electronic Communications Privacy Act of 1986 is discussed, lawsuits involving e-mail are described, and the future of e-mail privacy is considered. (11 references) (LRW)
Descriptors: Computer Networks, Court Litigation, Electronic Mail, Federal Legislation
Rotenberg, Marc – EDUCOM Review, 1994
Explains the work of Computer Professionals for Social Responsibility regarding privacy issues in the use of electronic networks; recommends principles that should be adopted for a National Information Infrastructure privacy code; discusses the need for public education; and suggests pertinent legislative proposals. (LRW)
Descriptors: Computer Networks, Confidential Records, Educational Needs, Federal Legislation
Wilson, David L. – Chronicle of Higher Education, 1993
Campus computing officials are working to improve security against computer hackers because of concerns about privacy, accidental or intentional damage to systems, and impediments to legitimate system users. Increasingly, public law enforcement authorities are called in but do not always take the problem seriously. (MSE)
Descriptors: Cheating, Computer Networks, Crime, Federal Legislation
Johnson, Deborah G. – EDUCOM Review, 1994
Discusses computer ethics and the use of computer networks. Topics addressed include computer hackers; software piracy; computer viruses and worms; intentional and unintentional abuse; intellectual property rights versus freedom of thought; the role of information in a democratic society; individual privacy; legislation; social attitudes; and the…
Descriptors: Access to Information, Computer Networks, Democracy, Educational Needs
Gordon, Mark L.; McKenzie, Diana J. P. – Illinois Libraries, 1994
Discusses the development of a national information superhighway. Highlights include the National Information Infrastructure; NREN (National Research and Education Network); private networks, including Prodigy; repositioning in the telecommunications industry, including telephone, cable, and entertainment companies; government regulations;…
Descriptors: Cable Television, Computer Networks, Copyrights, Economic Factors
Peer reviewed Peer reviewed
Hernon, Peter; McClure, Charles R. – Annual Review of Information Science and Technology (ARIST), 1993
Provides an overview of U.S. federal information policy and its treatment of electronic information resources. Highlights include government publications; electronic government information; main providers of government information, including the Government Printing Office; the Freedom of Information Act; public access and use; information…
Descriptors: Access to Information, Computer Networks, Copyrights, Databases