Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 4 |
Descriptor
Source
| Collegiate Microcomputer | 1 |
| Information Systems Education… | 1 |
| Journal of Information… | 1 |
| Journal of Legal Studies… | 1 |
| SAGE Open | 1 |
Author
Publication Type
| Journal Articles | 5 |
| Tests/Questionnaires | 5 |
| Reports - Descriptive | 2 |
| Reports - Research | 2 |
| Guides - Classroom - Teacher | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
| Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Coskun-Setirek, Abide; Tanrikulu, Zuhal – SAGE Open, 2021
This study intends to investigate the factors which can affect the sustainability of mobile learning (m-learning) from many perspectives. Current studies on the sustainability of m-learning are reviewed in the context of organizational, financial, legal and ethical, pedagogical, assessment, psychological, and social factors. In addition to the…
Descriptors: Electronic Learning, Distance Education, Sustainability, Universities
Binder, Perry; Willey, Susan L.; Weston, Harold A. – Journal of Legal Studies Education, 2020
The authors developed a teaching project for students to debate data and workplace privacy dilemmas, formulate plans of action for the use of certain data about workers and job applicants, and apply the law to reach and defend their solutions. The purpose of this versatile exercise is to sensitize both undergraduate and graduate business students…
Descriptors: Privacy, Data Use, Law Related Education, Business Administration Education
Hamilton, Lucas; Harrington, Michael; Lawrence, Cameron; Perrot, Remy; Studer, Severin – Information Systems Education Journal, 2017
This case examines the technological, ethical and legal issues surrounding the use of drones in business. Mary McKay, a recent Management Information Systems (MIS) graduate sets up a professional photography and videography business. She gains a leg up on the competition with drone-mounted cameras and live video streaming through the free…
Descriptors: Privacy, Legal Problems, Ethics, Technology Planning
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime

Peer reviewed
Direct link
