NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Coskun-Setirek, Abide; Tanrikulu, Zuhal – SAGE Open, 2021
This study intends to investigate the factors which can affect the sustainability of mobile learning (m-learning) from many perspectives. Current studies on the sustainability of m-learning are reviewed in the context of organizational, financial, legal and ethical, pedagogical, assessment, psychological, and social factors. In addition to the…
Descriptors: Electronic Learning, Distance Education, Sustainability, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Binder, Perry; Willey, Susan L.; Weston, Harold A. – Journal of Legal Studies Education, 2020
The authors developed a teaching project for students to debate data and workplace privacy dilemmas, formulate plans of action for the use of certain data about workers and job applicants, and apply the law to reach and defend their solutions. The purpose of this versatile exercise is to sensitize both undergraduate and graduate business students…
Descriptors: Privacy, Data Use, Law Related Education, Business Administration Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hamilton, Lucas; Harrington, Michael; Lawrence, Cameron; Perrot, Remy; Studer, Severin – Information Systems Education Journal, 2017
This case examines the technological, ethical and legal issues surrounding the use of drones in business. Mary McKay, a recent Management Information Systems (MIS) graduate sets up a professional photography and videography business. She gains a leg up on the competition with drone-mounted cameras and live video streaming through the free…
Descriptors: Privacy, Legal Problems, Ethics, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime