Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 3 |
| Guidelines | 3 |
| Computers | 2 |
| Access to Computers | 1 |
| Administration | 1 |
| Civil Liberties | 1 |
| Colleges | 1 |
| Computer Science Education | 1 |
| Court Litigation | 1 |
| Due Process | 1 |
| Educational Objectives | 1 |
| More ▼ | |
Author
| Kalle Grill | 1 |
| Karin Danielsson | 1 |
| Lena Enqvist | 1 |
| Loïs Vanhée | 1 |
| Melania Borit | 1 |
| Sermersheim, Michael D. | 1 |
| Stover, Mark | 1 |
Publication Type
| Guides - Non-Classroom | 2 |
| Books | 1 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
Education Level
Audience
| Practitioners | 3 |
| Administrators | 2 |
| Media Staff | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security

Peer reviewed
Direct link
