Publication Date
In 2025 | 4 |
Since 2024 | 29 |
Descriptor
Information Security | 29 |
Privacy | 13 |
Artificial Intelligence | 8 |
Computer Security | 8 |
Ethics | 8 |
Teaching Methods | 8 |
Computer Software | 6 |
Technology Uses in Education | 6 |
Educational Policy | 5 |
Foreign Countries | 5 |
Guidelines | 5 |
More ▼ |
Source
Author
A. Renee Staton | 1 |
Amy J. Connolly | 1 |
Angela VandenBroek | 1 |
Annie Irvine | 1 |
Aparna Satapathy | 1 |
Atul Bhatt | 1 |
Bernard Ngalim | 1 |
Carlos Novo | 1 |
Cheryl Beil | 1 |
Christian Metaxas | 1 |
Clarence Okoh | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 29 |
Journal Articles | 22 |
Guides - Non-Classroom | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 10 |
Elementary Secondary Education | 4 |
Early Childhood Education | 2 |
Elementary Education | 1 |
Kindergarten | 1 |
Preschool Education | 1 |
Primary Education | 1 |
Location
Indiana | 2 |
United Kingdom | 2 |
Virginia | 2 |
California | 1 |
Cameroon | 1 |
Canada | 1 |
European Union | 1 |
Florida | 1 |
New Mexico | 1 |
North Carolina | 1 |
Ohio | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Clarence Okoh – Center for Law and Social Policy, Inc. (CLASP), 2024
As the infrastructure of police surveillance grows in public schools, communities must be prepared to safeguard the rights and freedoms of students and families. This report is designed to help youth justice advocates, youth leaders, educators, caregivers, and policymakers understand and challenge the impact of school surveillance, data…
Descriptors: Youth, Artificial Intelligence, Student Rights, Disclosure
John Y. H. Bai; Olaf Zawacki-Richter; Wolfgang Muskens – Turkish Online Journal of Distance Education, 2024
Artificial intelligence in education (AIEd) is a fast-growing field of research. In previous work, we described efforts to explore the possible futures of AIEd by identifying key variables and their future prospects. This paper re-examines our discussions on the governance of data and the role of students and teachers by considering the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Natural Language Processing, Governance
Eric Yang; Cheryl Beil – New Directions for Higher Education, 2024
Artificial intelligence (AI) and machine learning (ML) have transformed the landscape of data management in higher education institutions, necessitating a critical evaluation of existing data privacy policies and practices. This research delves into the inadequacies of current frameworks in adapting to the swift evolution of Big Data. Student,…
Descriptors: Artificial Intelligence, Teacher Attitudes, Student Attitudes, College Students
Indiana Department of Education, 2024
The 2024-2025 Indiana Assessments Policy Manual communicates established guidelines regarding appropriate test administration in Indiana for key stakeholders including educators and Test Coordinators. This document contains policy guidance and appendices that delineate specific aspects of test implementation, including test security protocol,…
Descriptors: Testing, Guidelines, Educational Policy, Standardized Tests
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Indiana Department of Education, 2024
The 2023-2024 Indiana Assessments Policy Manual communicates established guidelines regarding appropriate test administration in Indiana for key stakeholders including educators and Test Coordinators. This document contains policy guidance and appendices that delineate specific aspects of test implementation, including test security protocol,…
Descriptors: Testing, Guidelines, Educational Policy, Standardized Tests
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Daire Maria Ni Uanachain; Lila Ibrahim Aouad – Thresholds in Education, 2025
This chapter investigates the dual role of Generative AI (GenAI) in providing support and feedback to students and in reshaping formative and summative educational assessments, addressing both the burgeoning opportunities for enhancing teaching methodologies and the associated ethical challenges. There is a focus on the necessity for balanced…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Teaching Methods
Previous Page | Next Page »
Pages: 1 | 2