Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Software | 5 |
Information Technology | 5 |
Legislation | 5 |
Access to Information | 2 |
Information Security | 2 |
Networks | 2 |
Academic Libraries | 1 |
Access to Computers | 1 |
Accountability | 1 |
Adolescents | 1 |
Case Studies | 1 |
More ▼ |
Source
Journal of Information… | 1 |
Journal of the American… | 1 |
ProQuest LLC | 1 |
Science Communication | 1 |
Universal Journal of… | 1 |
Author
Clouse, Shawn | 1 |
Fulton, Eric | 1 |
Lawrence, Cameron | 1 |
Majorek, Marta | 1 |
Mondschein, Lawrence G. | 1 |
Wand, Patricia A. | 1 |
Wojniak, Justyna | 1 |
Yu, Harlan Ming-Tun | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
European Union | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wojniak, Justyna; Majorek, Marta – Universal Journal of Educational Research, 2016
The paper concerns the opportunities of use information and communication technologies for the education purposes. It presents key assumptions of the European Union policy concerning innovative methods of training and the prospects for their further development. As nowadays one can observe increasing activity of the children and young people in…
Descriptors: Internet, Information Security, Child Safety, Risk
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
Yu, Harlan Ming-Tun – ProQuest LLC, 2012
Modern information technologies have transformed the meaning and promise of "open government." The term originally stood for the ideas of government transparency and public accountability. But with the rise of the Internet, "open government" has grown to encompass a wide range of civic goals--greater public participation and…
Descriptors: Information Technology, Public Policy, Computer Software, Access to Information

Mondschein, Lawrence G. – Journal of the American Society for Information Science, 1994
Reviews the use of spatial data and information technology by environmental managers and emergency responders. Discussion includes environmental legislation, the Toxic Chemical Release Inventory (TRI) database, public access to environmental information, information standardization problems, emergency response software development and a case study…
Descriptors: Access to Information, Case Studies, Computer Software, Computer Software Development

Wand, Patricia A. – Science Communication, 1995
Discusses protection of intellectual property and the fair use of information from the academic library perspective. Comments on several factors related to intellectual property: politics, economic and cultural contexts, time constraints, and software and online systems. Suggests developing new laws for online environments. (AEF)
Descriptors: Academic Libraries, Computer Software, Cultural Context, Economic Factors