Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Information Security | 6 |
Intellectual Property | 6 |
Information Technology | 4 |
Privacy | 4 |
Ethics | 3 |
College Faculty | 2 |
Copyrights | 2 |
Freedom of Speech | 2 |
Information Science Education | 2 |
Information Systems | 2 |
More ▼ |
Source
Journal of Information… | 2 |
Contemporary Issues in… | 1 |
Information Systems Education… | 1 |
International Journal of… | 1 |
ProQuest LLC | 1 |
Author
Brooks, Rochelle | 1 |
Chithambo, Loyce Maosa | 1 |
Clapper, Danial L. | 1 |
Ford, Janet C. | 1 |
Harris, Albert L. | 1 |
Kabata, Victor | 1 |
Kruck, S. E. | 1 |
Lang, Michael | 1 |
Peslak, Alan R. | 1 |
White, Barbara Jo | 1 |
Willey, Lorrie | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Audience
Location
Pennsylvania | 1 |
Texas | 1 |
United Arab Emirates (Abu… | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Chithambo, Loyce Maosa – ProQuest LLC, 2011
Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…
Descriptors: Information Technology, Teleworking, Information Security, Computer Security
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security