Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 9 |
Student Records | 9 |
Higher Education | 6 |
Information Security | 6 |
Privacy | 6 |
Computer Software | 4 |
College Administration | 3 |
Colleges | 3 |
Compliance (Legal) | 3 |
Confidential Records | 3 |
Confidentiality | 3 |
More ▼ |
Source
EDUCAUSE Review | 2 |
Chronicle of Higher Education | 1 |
Community College Journal | 1 |
Distance Learning | 1 |
EDUCAUSE | 1 |
EDUCAUSE Quarterly | 1 |
International Journal of… | 1 |
National Center for Education… | 1 |
Author
Brooks, D. Christopher | 1 |
Capo, Berta | 1 |
Corn, Michael | 1 |
Cunningham, Alisa F. | 1 |
Foster, Andrea L. | 1 |
Kabata, Victor | 1 |
Karp, Jason | 1 |
Kelly, Brian | 1 |
Lavagnino, Merri Beth | 1 |
McCormack, Mark | 1 |
McDermott, Maureen | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 5 |
Reports - Research | 2 |
Information Analyses | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Postsecondary Education | 9 |
Higher Education | 7 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Australia | 1 |
Canada | 1 |
Illinois | 1 |
Kansas | 1 |
Rhode Island | 1 |
United Arab Emirates (Abu… | 1 |
United States | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime
Cunningham, Alisa F.; Milam, John – National Center for Education Statistics, 2005
This report examines the feasibility of implementing a student unit record system to replace the student-related components that currently are based on aggregate institution-level data collected as part of the Integrated Postsecondary Education Data System (IPEDS). The feasibility study was initiated by the National Center for Education Statistics…
Descriptors: Feasibility Studies, Student Records, Evaluation Methods, Technology Integration
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers