Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Author
Cesarini, Paul | 1 |
Daly, Joanne English | 1 |
Hendrix, Dean | 1 |
Howard, Elizabeth V. | 1 |
Jackson, Gregory A. | 1 |
Johnson, Doug | 1 |
Li, Chengcheng | 1 |
Ryland, Jane | 1 |
Sumner, Mary R. | 1 |
Woods, David M. | 1 |
Yang, Samuel C. | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 5 |
Opinion Papers | 3 |
Reports - Research | 3 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Media Staff | 1 |
Location
Ohio | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Hendrix, Dean – portal: Libraries and the Academy, 2007
To assess their knowledge, use, and attitudes regarding peer-to-peer (P2P) applications, this study surveyed academic librarians (n = 162) via a mail-in survey. Correlations between the sample characteristics (age, gender, year of MLS, type of library job) and P2P knowledge, use, and attitudes were also explored. Overall, academic librarians…
Descriptors: Academic Libraries, Information Technology, Library Services, Ethics
Ryland, Jane – CAUSE/EFFECT, 1989
An overview of responses from a number of higher education associations (ACE, EDUCOM and NASULGC, and Cornell University) to the controversial issues that have arisen from the 1988 Internet "worm" are presented. Preliminary results from a CAUSE survey of higher education institutions are discussed. (Author/MLW)
Descriptors: Computer Networks, Computer Software, Databases, Ethics
Sumner, Mary R. – Educom Review, 1996
A study at Southern Illinois University examined ethical decisions of college students using networked computer resources and compared student responses with ethical attitudes and behaviors of information technology practitioners. Participants were asked to respond to nine case studies based upon actual situations that occur in academic settings.…
Descriptors: Case Studies, College Students, Comparative Analysis, Computer Networks

Jackson, Gregory A. – Educational Record, 1994
Widely accessible networked computing reduces important barriers to learning, gives students real-world tools for real-world problems, and broadens practical collegiality. The challenge is to ensure that members of the electronic community understand the legal and ethical boundaries they must respect. This is essentially an educational issue. (MSE)
Descriptors: Case Studies, Civil Liberties, Computer Networks, Copyrights

Daly, Joanne English – Journal of Educational Technology Systems, 1998
Addresses the following obstacles faced by faculty and students in the use of World Wide Web-based support and instruction: multiple skill levels of students performing Web research; credibility of Web information; reliability of campus computer-network systems; inequality of access to student computing resources; and lack of understanding of…
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Equal Education

Johnson, Doug – Emergency Librarian, 1995
Discusses issues involving physical and intellectual access to the Internet. Topics include skills for effective use; the importance of teachers and librarians ensuring full access for students; and a vision of information access needs in the future. The Mankato Internet Skill Rubrics evaluation checklist is appended. (AEF)
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Ethics