Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 8 |
Descriptor
Access to Information | 8 |
Computer Security | 8 |
Data Collection | 8 |
Information Security | 4 |
Information Technology | 4 |
Privacy | 4 |
Computer Mediated… | 3 |
Information Management | 3 |
Internet | 3 |
Behavior Change | 2 |
Case Studies | 2 |
More ▼ |
Source
Association Supporting… | 1 |
Informatics in Education | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Knowledge Quest | 1 |
ProQuest LLC | 1 |
State Education Standard | 1 |
T.H.E. Journal | 1 |
Author
Brown, Justine | 1 |
Howard, Elizabeth V. | 1 |
Kligiene, Stanislava Nerute | 1 |
Miller, Beth | 1 |
Paige Kowalski | 1 |
Price, Alan | 1 |
Smith, Peter, Ed. | 1 |
Woods, David M. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Collected Works - Proceedings | 2 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 2 |
Audience
Laws, Policies, & Programs
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
Price, Alan – ProQuest LLC, 2011
Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…
Descriptors: Physical Activities, Measurement Techniques, Physical Activity Level, Behavior Modification
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information
Brown, Justine – T.H.E. Journal, 2006
Over the past five years, the No Child Left Behind Act, with its mandates for collecting and documenting student achievement statistics, has fueled a surge in the volume of data collected by schools, districts, and state education departments. This information explosion has gone hand in hand with technology's growing affordability and…
Descriptors: Federal Legislation, Teacher Effectiveness, Data Collection, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers