Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Networks | 5 |
| Information Technology | 5 |
| Legal Problems | 5 |
| Colleges | 2 |
| Compliance (Legal) | 2 |
| Computer Security | 2 |
| Universities | 2 |
| Access to Information | 1 |
| Administrators | 1 |
| Business Administration… | 1 |
| Business Schools | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Opinion Papers | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 1 |
Audience
| Administrators | 1 |
| Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Schaffhauser, Dian – Campus Technology, 2012
Putting a CIO and a lawyer together in the same room may give one the start of a pretty decent joke, but it could also save an institution millions of dollars in legal fees. While the IT chief understands the systems that fall under the purview of compliance, the attorney is the go-to pessimist for identifying the "gotcha" elements when it comes…
Descriptors: Legal Problems, Compliance (Legal), Legal Responsibility, Information Technology
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Ferencz, Susan K. – CAUSE/EFFECT, 1997
Considers how civil law might treat claims of defamation arising from computer newsgroup postings. Concludes that newsgroup postings will probably be treated as a hybrid of print and broadcast media, and that newsgroup users will vigorously and aggressively protect freedoms of speech and press. While traditional defenses to defamation charges will…
Descriptors: Civil Law, Computer Networks, Conflict Resolution, Freedom of Speech
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security

Peer reviewed
Direct link
