Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 7 |
Information Technology | 7 |
Laws | 7 |
Federal Legislation | 5 |
Privacy | 5 |
Computer Software | 3 |
College Environment | 2 |
Computers | 2 |
Confidential Records | 2 |
Data | 2 |
Educational Policy | 2 |
More ▼ |
Author
Anderson, Alicia | 1 |
Broderick, Martha A. | 1 |
Cleveland, Lara L. | 1 |
Gibson, Virginia R. | 1 |
Karmakar, Nitya L. | 1 |
Kim, Richard S. Y. | 1 |
Nixon, Andrea | 1 |
Peslak, Alan R. | 1 |
Tarasewich, Peter | 1 |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Audience
Location
Pennsylvania | 1 |
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing

Broderick, Martha A.; Gibson, Virginia R.; Tarasewich, Peter – Internet Research, 2001
In the United States, electronic signatures recently became as legally binding as printed signatures. Reviews the status of electronic signatures in the United States, and compares it to work done by the United Nations. Summarizes the technology that can be used to implement electronic signatures. Discusses problems and open issues surrounding the…
Descriptors: Computer Security, Federal Legislation, Information Technology, Laws
Karmakar, Nitya L. – 2002
The Internet remains as a wonder for the 21st century and its growth is phenomenon. According to a recent survey, the online population is now about 500 million globally and if this trend continues, it should reach 700 million by the end of 2002. This exponential growth of the Internet has given rise to several security, privacy and ethical…
Descriptors: Computer Security, Ethics, Federal Government, Federal Legislation
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers