NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)0
Since 2017 (last 10 years)1
Since 2007 (last 20 years)11
Laws, Policies, & Programs
First Amendment1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Schaffhauser, Dian – Campus Technology, 2012
Putting a CIO and a lawyer together in the same room may give one the start of a pretty decent joke, but it could also save an institution millions of dollars in legal fees. While the IT chief understands the systems that fall under the purview of compliance, the attorney is the go-to pessimist for identifying the "gotcha" elements when it comes…
Descriptors: Legal Problems, Compliance (Legal), Legal Responsibility, Information Technology
Canadian Association of University Teachers, 2015
Increasingly, university and college administrators are contracting out their institutions' operational information technology (IT) needs. Specifically, this means moving from an IT system with a server based at the institution with an in house IT support staff to a cloud based system outside the institution where most of the staff resources are…
Descriptors: Outsourcing, Information Technology, Universities, Privacy
Lee, Chul Ho – ProQuest LLC, 2012
This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…
Descriptors: Information Technology, Information Security, Incentives, Outsourcing
Kirschenbaum, Matthew G.; Ovenden, Richard; Redwine, Gabriela – Council on Library and Information Resources, 2010
The purpose of this report is twofold: first, to introduce the field of digital forensics to professionals in the cultural heritage sector; and second, to explore some particular points of convergence between the interests of those charged with collecting and maintaining born-digital cultural heritage materials and those charged with collecting…
Descriptors: Evidence, Persuasive Discourse, Information Technology, Cultural Background
Rico Sulayes, Antonio – ProQuest LLC, 2012
As the violence in the Mexican drug war escalates, a proliferation of social media sites about drug trafficking in Mexico was followed by the murder of some of their users, and the eventual disappearance of many of those sites. Despite these events, there still exist a number of drug-dealing related social media outlets in this country with a…
Descriptors: Drug Abuse, Crime, Social Networks, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Peacock, Susi; Gordon, Lisi; Murray, Sue; Morss, Kate; Dunlop, Gloria – British Journal of Educational Technology, 2010
Emergent research indicates that electronic portfolios (ePortfolios) can have a positive impact on the learning experience, but there are significant challenges--pedagogical and technological--which may limit their effectiveness. This paper contributes to research by providing further evidence about such challenges from the tutor perspective and…
Descriptors: Portfolios (Background Materials), Higher Education, Legal Problems, Social Support Groups
Chronicle of Higher Education, 2008
As new technologies emerge on campuses, how can colleges avoid legal land mines? What are the areas of greatest risk, and how should higher-education leaders deal with them? In this article, three experts offered their advice at the Technology Forum: Beth Cate, associate general counsel at Indiana University, on data privacy and security; Steven…
Descriptors: Intellectual Property, College Faculty, Higher Education, Legal Problems
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security
Bugeja, Michael J. – Education Digest: Essential Readings Condensed for Quick Review, 2008
Most people have at least secondhand knowledge about Second Life, a virtual-reality world created by Linden Lab, in which avatars (digital characters) lease "islands" for real-life purposes--to sell products, conduct classes, do research, hold conferences, and even recruit for admissions. About nine million avatars reportedly interact on this…
Descriptors: Information Technology, Technology Integration, Technology Uses in Education, Technology Education
Darden, Mary Landon – Rowman & Littlefield Education, 2009
In a world progressing with dizzying acceleration into the Information Age, the slow, measured approach of the traditional university can place administrator, faculty member, and student alike at a disadvantage. To move into this brave new world, the academic animal needs tools. "Beyond 2020: Envisioning the Future of Universities in America" is…
Descriptors: Higher Education, Legal Problems, Continuing Education, Governance
Ferencz, Susan K. – CAUSE/EFFECT, 1997
Considers how civil law might treat claims of defamation arising from computer newsgroup postings. Concludes that newsgroup postings will probably be treated as a hybrid of print and broadcast media, and that newsgroup users will vigorously and aggressively protect freedoms of speech and press. While traditional defenses to defamation charges will…
Descriptors: Civil Law, Computer Networks, Conflict Resolution, Freedom of Speech
Hersey, Karen – CAUSE/EFFECT, 1995
While college libraries embrace new technologies to provide access to a broader range of information, they must also cope with high costs, both financial and legal. In the print medium, access and distribution are governed by copyright laws; in the electronic media, they are dependent on the technology available to the library and on terms of…
Descriptors: Access to Information, College Administration, College Libraries, Computer Oriented Programs
Previous Page | Next Page ยป
Pages: 1  |  2