Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 3 |
| Computer Software | 3 |
| Legal Responsibility | 3 |
| Computer Uses in Education | 2 |
| Educational Technology | 2 |
| Access to Computers | 1 |
| College Administration | 1 |
| Compliance (Legal) | 1 |
| Computer Mediated… | 1 |
| Computers | 1 |
| Confidential Records | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Opinion Papers | 1 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
| Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Lesisko, Lee James – 2003
This study analyzes the controversy of software piracy in education. It begins with a real world scenario that presents the setting and context of the problem. The legalities and background of software piracy are explained and true court cases are briefly examined. Discussion then focuses on explaining why individuals and organizations pirate…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Costs
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers

Direct link
Peer reviewed
