Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 5 |
Privacy | 5 |
Technology | 5 |
Access to Information | 1 |
Audits (Verification) | 1 |
Civil Liberties | 1 |
Coding | 1 |
Community Colleges | 1 |
Compliance (Legal) | 1 |
Computer Mediated… | 1 |
Computer Science | 1 |
More ▼ |
Author
Bachman, Dale J. | 1 |
Basham, Matt | 1 |
Bingbing Di | 1 |
Brown, Ezra A. | 1 |
Gang Zhao | 1 |
Hui He | 1 |
Karst, Nathaniel | 1 |
Michael L. Schliep | 1 |
Norton, Anderson H. | 1 |
Qingqing Guo | 1 |
Slegers, Rosa | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Michael L. Schliep – ProQuest LLC, 2021
Communication privacy is constantly under threat from Nation State Adversaries (NSA). This has led many platforms, such as Facebook and Apple, to implement secure conversation cryptographic protocols in their messaging applications. However, many of the protocols do not provide provable security and do not provide other security guarantees about…
Descriptors: Privacy, Interpersonal Communication, Computer Mediated Communication, Social Media
Karst, Nathaniel; Slegers, Rosa – PRIMUS, 2019
Many of the applied mathematics courses we teach touch upon a range of rich and important ethical issues -- issues that, for a number of reasons, are rarely openly discussed in class. In this work, we describe a sequence of activities co-designed and co-taught by philosophy and mathematics faculty in the hopes of bridging the divide between the…
Descriptors: Team Teaching, Ethics, Mathematics Instruction, Technology
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Basham, Matt – Community College Journal, 2003
Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…
Descriptors: Civil Liberties, Community Colleges, Computer Security, Computers