Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Information Technology | 14 |
Intellectual Property | 14 |
Privacy | 14 |
Internet | 8 |
Copyrights | 5 |
Ethics | 5 |
Computer Security | 4 |
Access to Information | 3 |
Computer Mediated… | 3 |
Federal Legislation | 3 |
Freedom of Speech | 3 |
More ▼ |
Source
Chronicle of Higher Education | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Journal of the American… | 1 |
ProQuest LLC | 1 |
TECHNOS | 1 |
Telecommunications | 1 |
Theory Into Practice | 1 |
Author
Alexander, Bryan | 1 |
Bell, Mary Ann | 1 |
Chartrand, Robert Lee | 1 |
Clapper, Danial L. | 1 |
Ford, Janet C. | 1 |
Ng, Wing Shui | 1 |
Office of the Press Secretary… | 1 |
Peslak, Alan R. | 1 |
Raney, Mardell | 1 |
Ravitz, Jason | 1 |
Rees, Warren | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Policymakers | 1 |
Location
California | 1 |
Hong Kong | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
Defining Issues Test | 1 |
What Works Clearinghouse Rating
Ng, Wing Shui – Journal of Information Technology Education: Research, 2020
Aim/Purpose: Teachers usually educate students' cyberethics using debate, case-based discussion, and role-playing instructional methods in a face-to-face setting. With the presence of teacher and peers, students may not be willing to share their true attitudes, and it may affect the effectiveness of the teaching methods. To tackle the challenge,…
Descriptors: Ethics, Teaching Methods, Instructional Effectiveness, Self Evaluation (Individuals)
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Shahand, Assadullah – ProQuest LLC, 2010
Growing incidences of corporate ethical misconducts have revived the debate over ethical reasoning and moral development of corporate managers. The role of information technology (IT) in the ethical dilemmas is becoming more evident as virtual environments become increasingly popular, organizations adopt digital form of record keeping, and the…
Descriptors: Ethics, Decision Making, Moral Development, Moral Values
Chronicle of Higher Education, 2008
As new technologies emerge on campuses, how can colleges avoid legal land mines? What are the areas of greatest risk, and how should higher-education leaders deal with them? In this article, three experts offered their advice at the Technology Forum: Beth Cate, associate general counsel at Indiana University, on data privacy and security; Steven…
Descriptors: Intellectual Property, College Faculty, Higher Education, Legal Problems
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Bell, Mary Ann – 2001
In today's information and technology-driven world, an increasing number of moral and ethical dilemmas arise. Information ethics involves many complex and challenging issues for today's educators. "The Principles of Information Ethics," by Richard Severson, provides a thought-provoking and common sense discussion of issues related to use…
Descriptors: Computer Oriented Programs, Computer Use, Copyrights, Ethics
Chartrand, Robert Lee – 1989
During the past 12 years, encompassing the 95th through the 100th Congresses, hundreds of bills and resolutions have been introduced and debated that were concerned with information policy, related programs, and the ways in which advanced information technologies (computers, telecommunications, microform systems, video and audio devices) are…
Descriptors: Archives, Confidentiality, Federal Legislation, Information Services

Rees, Warren; And Others – Journal of the American Society for Information Science, 1991
The ability to collect, store, retrieve, and combine information in computerized databases has magnified the potential for misuse of information. Laws have begun to deal with these new threats by expanding rights of privacy, copyright, misrepresentation, products liability, and defamation. Laws regarding computerized databases are certain to…
Descriptors: Copyrights, Delivery Systems, Information Centers, Information Dissemination
Alexander, Bryan – Theory Into Practice, 2008
Students are, increasingly, digital content producers, and participate extensively in evolving online social networks. The emergence of the former represents subtle changes in students' experience of images, audience, copyright, ownership of learning, and technology. Experiencing the latter places students in an awkward position in terms of…
Descriptors: Intellectual Property, Educational Technology, Visual Environment, Social Networks
Umbach, Kenneth W. – 1997
This paper reviews the background and key terminology of the Internet, its current scope and use, and a selection of public policy issues. "Chapter 1: What Is the Internet?" includes an overview; capsule history; explanation of how the Internet works; basic terminology; and the kinds of information available on the Internet.…
Descriptors: Access to Information, Computer Uses in Education, Distance Education, Electronic Libraries
Ravitz, Jason – 1997
This paper discusses professional ethical concerns for individuals conducting research in electronic collaborative environments. Existing professional codes of ethics were reviewed, and respected figures in the field of educational technology were engaged in conversations about ethics, professional communication, and new technologies. When…
Descriptors: Codes of Ethics, Computer Mediated Communication, Ethics, Higher Education
National Association of State Universities and Land Grant Colleges, Washington, DC. – 1995
This publication details the critical issues being debated in telecommunications today and their impact on colleges and universities in the future. An introduction identifies important changes in recent years including technological advances, the digitizing of communication, privatization and commercialization of the Internet, possible significant…
Descriptors: Access to Information, Distance Education, Economic Factors, Federal Legislation
Raney, Mardell – TECHNOS, 1997
This interview with Esther Dyson, who is president and owner of EDventure Holdings which focuses on emerging information technology worldwide, discusses personal responsibility for technology; government's role; content ownership and intellectual property; Internet development; education and computers; parents' role in education; teacher…
Descriptors: Access to Computers, Access to Information, Artificial Intelligence, Censorship