NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Mazur, Joan M. – School Business Affairs, 1995
As schools merge onto the information highway, districts must address their liability associated with Internet access. Schools need a practical policy supporting high access to global educational resources while limiting district liability. USENET provides easy access to controversial and pornographic materials. This article outlines federal…
Descriptors: Computer Networks, Elementary Secondary Education, Freedom of Information, Legal Responsibility
Peer reviewed Peer reviewed
Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks
Hodges, Marjorie W.; Worona, Steven L. – CAUSE/EFFECT, 1996
Provides guidelines for the development of campus computer policies, focusing on legal issues related to adult material, harassment, privacy, commerce, and copyright. Notes that computer use policies and practices need to evolve in concert with the changing computer culture. (MDM)
Descriptors: Business, College Role, Computer Networks, Computers
Denning, Dorothy E., Ed.; Lin, Herbert S., Ed. – 1994
This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services,…
Descriptors: Access to Information, Censorship, Computer Networks, Confidentiality
Hawke, Constance S. – 2001
The purpose of this book is threefold: (1) to inform Internet users of the legal ramifications of their on-line activities; (2) to help administrators handle specific situations or complaints regarding Internet activity; and (3) to provide guidance for the formulation of acceptable computer use policies on campuses. The chapters are: chapter 1,…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design