Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Educational Legislation | 7 |
Federal Legislation | 5 |
Privacy | 4 |
Safety | 3 |
Student Records | 3 |
Accountability | 2 |
College Students | 2 |
Data | 2 |
Distance Education | 2 |
Electronic Learning | 2 |
More ▼ |
Source
Continuing Higher Education… | 2 |
State Education Standard | 2 |
International Journal of… | 1 |
International Journal on… | 1 |
Knowledge Quest | 1 |
Author
Abilock, Debbie | 1 |
Abilock, Rigele | 1 |
Aceves, Patricia A. | 1 |
Aceves, Robert I. | 1 |
Hipsky, Shellie | 1 |
Machuca, Ana | 1 |
McNabb, Lori | 1 |
Morris, Pamela | 1 |
Pruitt, Kobie | 1 |
Reg Leichty | 1 |
Torres, Karin | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 5 |
Reports - Research | 2 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Adult Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Audience
Location
Pennsylvania | 1 |
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
G I Bill | 1 |
Higher Education Act 1965 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Pruitt, Kobie – State Education Standard, 2016
Just as adults' personal lives and data are increasingly inhabiting online spaces, so are students. While this shift brings many benefits and the possibility of learning tailored to individual students' needs, it is also brings new challenges. Students create an electronic trail of information that creates an obvious concern: How can they enjoy…
Descriptors: Student Records, Safety, Computer Security, Information Security
Abilock, Rigele; Abilock, Debbie – Knowledge Quest, 2016
In April 2015, U.S. House Representatives Luke Messer and Jared Polis introduced the bipartisan Student Digital Privacy and Parental Rights Act of 2015, designed to significantly restrict how online education vendors can exploit the personal data of students who use their products. For some, the bill does not go far enough. It is evident that…
Descriptors: Privacy, Parent Rights, Federal Legislation, Safety
Hipsky, Shellie; Younes, Wiam – International Journal of Information and Communication Technology Education, 2015
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Descriptors: Elementary School Teachers, Secondary School Teachers, Teacher Attitudes, Privacy
Machuca, Ana; Torres, Karin; Morris, Pamela; Whitley, William – International Journal on E-Learning, 2014
This paper will summarize some of challenges faced by military students enrolled in an associate and bachelors online program at American Public University System (APUS). The survey results on which the study is based exposed the following problems faced by military personnel: 48.7% had difficulties working around military obligations, 33.3%…
Descriptors: Military Personnel, Public Colleges, Online Courses, Electronic Learning
McNabb, Lori – Continuing Higher Education Review, 2010
This article discusses the implementation this year of the Department of Education's Higher Education Opportunity Act of 2008 (HEOA), which requires accreditors to ensure that an institution that offers distance or correspondence education has a process in place to establish that a student who registers in a course or program is also the same…
Descriptors: Distance Education, Higher Education, College Students, Identification
Aceves, Patricia A.; Aceves, Robert I. – Continuing Higher Education Review, 2009
Since the signing of the Higher Education Opportunity Act (HEOA) in August 2008, providers of distance education courses and programs have been looking into procedures and technologies that will satisfy the accrediting agencies responsible for enforcing the law. Continuing education administrators are at the forefront because of the pervasiveness…
Descriptors: Distance Education, Continuing Education, Higher Education, Educational Legislation