Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Security | 12 |
Information Technology | 12 |
Intellectual Property | 12 |
Copyrights | 4 |
Ethics | 4 |
Information Security | 4 |
Privacy | 4 |
Computer Software | 3 |
Crime | 3 |
Foreign Countries | 3 |
Internet | 3 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 5 |
Reports - Research | 3 |
Dissertations/Theses -… | 2 |
Reports - Evaluative | 2 |
Tests/Questionnaires | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Location
China | 3 |
United States | 2 |
Australia | 1 |
Brunei | 1 |
Burma | 1 |
India | 1 |
Indonesia | 1 |
Malaysia | 1 |
New Zealand | 1 |
Pennsylvania | 1 |
Philippines | 1 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
UNESCO Bangkok, 2015
The proliferation and emergence of information and communications technology (ICT) has fundamentally changed the way in which society operates. The increasingly ubiquitous nature of ICT has also inevitably caused it to become indispensable as part of daily life and a basic building block of modern society. When used effectively and appropriately,…
Descriptors: Information Technology, Foreign Countries, Computer Security, Internet
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Chithambo, Loyce Maosa – ProQuest LLC, 2011
Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…
Descriptors: Information Technology, Teleworking, Information Security, Computer Security
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Chronicle of Higher Education, 2008
As new technologies emerge on campuses, how can colleges avoid legal land mines? What are the areas of greatest risk, and how should higher-education leaders deal with them? In this article, three experts offered their advice at the Technology Forum: Beth Cate, associate general counsel at Indiana University, on data privacy and security; Steven…
Descriptors: Intellectual Property, College Faculty, Higher Education, Legal Problems
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Rawlinson, David R.; Lupton, Robert A. – Journal of Education for Business, 2007
Students' attitudes and perceptions regarding the use of unlicensed software are important to educators and businesses. Students have a proven propensity to pirate software and other intellectual property. By understanding how attitudes and perceptions toward software piracy differ among university students in a cross-national context, educators…
Descriptors: Student Attitudes, Computer Software, Information Technology, Foreign Countries
National Association of State Universities and Land-Grant Colleges, 2004
This document represents the higher education and library community's guiding public policy agenda on information technology (IT) for the current year. The Higher Education Information Technology (HEIT) Alliance is a coalition of 11 national higher education and library associations, whose members represent a broad array of stakeholders on college…
Descriptors: Telecommunications, Library Associations, Information Technology, Intellectual Property