Producing video clips for information ethics and security in higher education

Tomohito Wada, Izumi Fuse, Shigeto Okabe, Takeo Tatsumi, Hiroshi Ueda, Tetsutaro Uehara, Michio Nakanishi, Takahiro Tagawa, Ikuya Murata

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)


    A consortium of IT professionals across various universities in Japan has been producing educational video clips regarding information ethics and cyber security issues for university students. The clips were revised and supplemented several times, with the most recent version released in late 2016. This video collection consists of twenty-two short stories involving three university students who were involved in IT issues or incidents. The video topics and original scripts were discussed and written by various university faculty members. Professionals at a production company then refined the scripts and made the videos. The video clips have been widely used by many Japanese universities and have been well received by students. Most importantly, the videos raise important issues about information ethics and help students understand their role in computer security.

    Original languageEnglish
    Title of host publicationSIGUCCS 2017 - Proceedings of the 2017 ACM Annual Conference on SIGUCCS
    PublisherAssociation for Computing Machinery
    Number of pages3
    ISBN (Electronic)9781450349192
    Publication statusPublished - Oct 1 2017
    Event45th ACM Annual SIGUCCS Conference, SIGUCCS 2017 - Seattle, United States
    Duration: Oct 1 2017Oct 4 2017

    Publication series

    NameProceedings ACM SIGUCCS User Services Conference
    VolumePart F131713


    Other45th ACM Annual SIGUCCS Conference, SIGUCCS 2017
    Country/TerritoryUnited States

    All Science Journal Classification (ASJC) codes

    • Computer Science Applications
    • Software
    • Information Systems
    • Education


    Dive into the research topics of 'Producing video clips for information ethics and security in higher education'. Together they form a unique fingerprint.

    Cite this