NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive22
Journal Articles12
Guides - Non-Classroom3
Assessments and Surveys
Test of Adult Basic Education1
What Works Clearinghouse Rating
Showing 1 to 15 of 22 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Indiana Department of Education, 2024
The 2024-2025 Indiana Assessments Policy Manual communicates established guidelines regarding appropriate test administration in Indiana for key stakeholders including educators and Test Coordinators. This document contains policy guidance and appendices that delineate specific aspects of test implementation, including test security protocol,…
Descriptors: Testing, Guidelines, Educational Policy, Standardized Tests
Indiana Department of Education, 2024
The 2023-2024 Indiana Assessments Policy Manual communicates established guidelines regarding appropriate test administration in Indiana for key stakeholders including educators and Test Coordinators. This document contains policy guidance and appendices that delineate specific aspects of test implementation, including test security protocol,…
Descriptors: Testing, Guidelines, Educational Policy, Standardized Tests
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
European University Association, 2021
In late December 2020, the European Union and the United Kingdom concluded a Trade and Cooperation Agreement, setting the framework for their future cooperation in the post-Brexit era. To better understand the new relationship, EUA has prepared this briefing on the specific implications for universities. It covers EU programmes, travel, data…
Descriptors: Public Policy, Universities, Guidelines, International Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Mohammed Airaj – Education and Information Technologies, 2024
This paper proposes a human-centered approach to using Artificial Intelligence (AI) in higher education that promotes equitable access to knowledge while preserving privacy and ethics. Through the lens of third-generation Activity Theory we examine the interaction between three activity systems in higher education: AI teachers, human teachers, and…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Grama, Joanna Lyn – Institute for Higher Education Policy, 2019
Our current federal postsecondary data system is incomplete and fails to provide today's students with the accurate, timely information that they need to inform their college choices and promote their success. As policymakers consider proposals to improve this federal data system, it is critical that they work in tandem to protect students'…
Descriptors: Privacy, Information Security, Postsecondary Education, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
International Journal of Testing, 2016
The amount and severity of security threats have increased considerably over the past two decades, calling into question the validity of assessments administered around the world. These threats have increased for a number of reasons, including the popular use of computerized and online technologies for test administration and the use of almost…
Descriptors: Testing, Information Security, Guidelines, Deception
Privacy Technical Assistance Center, 2016
In February 2014, the Privacy Technical Assistance Center (PTAC) issued guidance titled "Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices." This Model Terms of Service document is intended to further assist schools and school districts in implementing that guidance. In a traditional…
Descriptors: Privacy, Student Records, Contracts, Educational Legislation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich – Journal of Learning Analytics, 2016
To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…
Descriptors: Privacy, Guidelines, Ethics, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Zydney, Janet Mannheimer; Hooper, Simon – TechTrends: Linking Research and Practice to Improve Learning, 2015
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code…
Descriptors: Video Technology, Computer Software, Computer System Design, Design Requirements
Foundation for Excellence in Education (ExcelinEd), 2016
Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…
Descriptors: Student Records, Information Security, Privacy, Information Utilization
Previous Page | Next Page ยป
Pages: 1  |  2