Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 11 |
| Since 2017 (last 10 years) | 16 |
Descriptor
| Computer Security | 16 |
| Data Collection | 16 |
| Information Security | 13 |
| Data Analysis | 6 |
| Privacy | 5 |
| Risk | 4 |
| COVID-19 | 3 |
| Foreign Countries | 3 |
| Pandemics | 3 |
| Barriers | 2 |
| College Faculty | 2 |
| More ▼ | |
Source
Author
| Carrie Klein | 1 |
| Casagrande, Marco | 1 |
| Celeda, Pavel | 1 |
| Christine Wildman | 1 |
| Conti, Mauro | 1 |
| Di Gangi, Paul M. | 1 |
| Edwards, John | 1 |
| Fedeli, Monica | 1 |
| Georgia Zempila | 1 |
| Goh, Samuel H. | 1 |
| Hamrick, Jennifer D. | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 10 |
| Journal Articles | 9 |
| Dissertations/Theses -… | 3 |
| Reports - Descriptive | 2 |
| Guides - Non-Classroom | 1 |
| Legal/Legislative/Regulatory… | 1 |
Education Level
| Postsecondary Education | 5 |
| Higher Education | 4 |
| Elementary Secondary Education | 2 |
| High Schools | 2 |
| Secondary Education | 2 |
| Elementary Education | 1 |
Audience
| Administrators | 1 |
| Community | 1 |
| Policymakers | 1 |
Location
| Maryland | 2 |
| Australia | 1 |
| Canada | 1 |
| Florida (Miami) | 1 |
| Illinois (Urbana) | 1 |
| Indiana | 1 |
| Italy | 1 |
| Maine | 1 |
| Massachusetts (Boston) | 1 |
| Massachusetts (Cambridge) | 1 |
| Missouri (Saint Louis) | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Coronavirus Aid Relief and… | 1 |
| Every Student Succeeds Act… | 1 |
| Individuals with Disabilities… | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Carrie Klein; Sean Baser; Jessica Colorado – State Higher Education Executive Officers, 2024
Integrity, security, and sustained investment in data systems are critical for state agencies and stakeholders to effectively harness information to inform policy and decision-making in postsecondary education. Recognizing this crucial need, the State Higher Education Executive Officers Association (SHEEO) has led the charge with its State…
Descriptors: Postsecondary Education, Educational Finance, Governance, Data Collection
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Georgia Zempila; Stelios Xinogalos – Discover Education, 2025
The Internet is nowadays an integral part of adolescents' everyday life, bringing several benefits but risks as well. Although adolescents are familiar with technology, there seems to be a gap in their knowledge in safety and data protection on the Internet. So it is clear that adolescents have to be educated on relevant issues and serious games…
Descriptors: Educational Games, Teaching Methods, Internet, Information Security
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Pangrazio, Luci; Selwyn, Neil – Pedagogy, Culture and Society, 2021
The ongoing 'datafication' of contemporary society has a number of implications for schools and schooling. One is the increasing calls for schools to help develop young people's understandings about the role that digital data now plays in their everyday lives -- especially in terms of the 'data economy' and 'surveillance capitalism'. Reporting on…
Descriptors: Data Collection, Data Analysis, Technology Uses in Education, Data Processing
Nowicki, Jacqueline M. – US Government Accountability Office, 2020
A cybersecurity incident is an event that actually or potentially jeopardizes a system or the information it holds. When a student's personal information is disclosed, it can lead to physical, emotional, and financial harm. Organizations are vulnerable to data security risks, including over 17,000 public school districts and approximately 98,000…
Descriptors: Information Security, Computer Security, Student Records, Elementary Secondary Education
Business-Higher Education Forum, 2019
"Creating Purposeful Partnerships" offers insights into business-led regional talent ecosystems that facilitate access, alignment, and development of a prepared workforce with the skills necessary for companies' long-term success. The findings of this report serve as a playbook for CEOs and their executive teams for establishing…
Descriptors: Partnerships in Education, School Business Relationship, Higher Education, Teamwork
National Forum on Education Statistics, 2022
Digital inequity has been a long-standing issue in the education community. A lack of home internet and technology devices can not only hinder students' ability to access educational resources at home, but can also have a detrimental effect on student achievement. Education agencies have taken steps over the past decades to address digital…
Descriptors: Access to Computers, Technology Uses in Education, Educational Technology, Internet
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Previous Page | Next Page »
Pages: 1 | 2
Peer reviewed
Direct link
