Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Security | 5 |
| Freedom | 5 |
| Internet | 4 |
| Access to Information | 3 |
| Privacy | 3 |
| Access to Computers | 2 |
| Computer Networks | 2 |
| Ethics | 2 |
| Information Technology | 2 |
| Safety | 2 |
| Censorship | 1 |
| More ▼ | |
Source
| Chronicle of Higher Education | 2 |
| Campus Technology | 1 |
| Community College Journal | 1 |
| Journal of Education and… | 1 |
Author
| Basham, Matt | 1 |
| Cesarini, Paul | 1 |
| Kansu, Ceren Çevik | 1 |
| Poremba, Sue Marquette | 1 |
| Titus, Aaron | 1 |
| Öksüz, Yücel | 1 |
Publication Type
| Journal Articles | 5 |
| Reports - Descriptive | 3 |
| Opinion Papers | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
| Elementary Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Turkey | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kansu, Ceren Çevik; Öksüz, Yücel – Journal of Education and Training Studies, 2019
This study was aimed to determine of their perceptions and levels of digital citizenship for pre-service classroom teachers. The study was conducted with 76 senior pre-service classroom teachers at Education Faculty of B. U. The study is survey research. In this research, "The Digital Citizenship Scale" developed by Kocadag (2012) was…
Descriptors: Preservice Teachers, Student Attitudes, Technological Literacy, Information Technology
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Titus, Aaron – Chronicle of Higher Education, 2008
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Descriptors: Privacy, Educational Environment, Internet, Data
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Basham, Matt – Community College Journal, 2003
Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…
Descriptors: Civil Liberties, Community Colleges, Computer Security, Computers

Peer reviewed
Direct link
