Publication Date
| In 2026 | 0 |
| Since 2025 | 3 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 9 |
| Since 2007 (last 20 years) | 12 |
Descriptor
Source
Author
| Ahadi Haji Mohd Nasir | 1 |
| Alier, Marc | 1 |
| Altun, Halis | 1 |
| Baker, Elizabeth | 1 |
| Bandara, Arosha | 1 |
| Basil Hanafi | 1 |
| Caldwell, Helen | 1 |
| Devyaani Singh | 1 |
| Ely Salwana | 1 |
| Haddad, Hatem | 1 |
| Kaiiali, Mustafa | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 8 |
| Journal Articles | 7 |
| Reports - Evaluative | 2 |
| Books | 1 |
| Guides - Non-Classroom | 1 |
| Legal/Legislative/Regulatory… | 1 |
| Non-Print Media | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 2 |
Audience
| Policymakers | 1 |
| Researchers | 1 |
| Teachers | 1 |
Location
| Illinois | 1 |
| New Hampshire | 1 |
| Oregon | 1 |
| Tennessee (Nashville) | 1 |
| Texas | 1 |
| United Kingdom | 1 |
| West Virginia | 1 |
| Wisconsin (Milwaukee) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Office of Inspector General, US Department of Education, 2025
The main objective of the Fiscal Year (FY) 2025 Federal Information Security Modernization Act of 2014 (FISMA) audit was to determine whether the United States Department of Education (Department)'s overall information security program and practices are effective as they relate to federal information security requirements. To meet this objective,…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
National Forum on Education Statistics, 2021
The "Forum Guide to Metadata" presents and examines the ways in which metadata can be used by education agencies to improve data quality and promote a better understanding of education data. Supported by metadata-related case studies from state and local education agencies, the guide highlights the uses of metadata from a technical point…
Descriptors: Metadata, Information Management, Data Collection, Data Use
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Zhang, Zhiyong; Zhang, Danyang – Grantee Submission, 2021
Data science has maintained its popularity for about 20 years. This study adopts a bottom-up approach to understand what data science is by analyzing the descriptions of courses offered by the data science programs in the United States. Through topic modeling, 14 topics are identified from the current curricula of 56 data science programs. These…
Descriptors: Statistics Education, Definitions, Course Descriptions, Computer Science Education
Shirley M. Matteson; Sonya E. Sherrod; Sevket Ceyhun Cetin – Sage Research Methods Cases, 2016
The value of a study relies heavily on the quality of data collection and analysis. No matter the skill level of the researchers or what journal the study is published in, poor collection and management of data result in a poor study. Our personal experiences and impressions of collecting, storing, protecting, and retrieving data for a U.S.…
Descriptors: Data Collection, Information Security, Database Management Systems, Information Storage
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
US Government Accountability Office, 2016
Enacted in 2014, the Workforce Innovation and Opportunity Act (WIOA) brought numerous changes to existing federal employment and training programs, including requiring the Department of Labor (DOL) and the Department of Education (Education) to implement a common performance accountability system across the six WIOA-designated core programs. WIOA…
Descriptors: Federal Legislation, Legislators, Accountability, Job Training

Peer reviewed
Direct link
