Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 23 |
Since 2006 (last 20 years) | 80 |
Descriptor
Access to Information | 139 |
Computer Security | 139 |
Internet | 61 |
Information Technology | 40 |
Privacy | 35 |
Information Security | 27 |
Computer Networks | 26 |
Computer Software | 24 |
Foreign Countries | 24 |
Computer Mediated… | 23 |
Computer Uses in Education | 22 |
More ▼ |
Source
Author
Hope, Andrew | 3 |
Aldridge, Alicia | 2 |
Forcht, Karen | 2 |
Aburto, Rafael | 1 |
Acquisti, Alessandro | 1 |
Akcay, Behiye | 1 |
Alawneh, John | 1 |
Alenezi, Abdullah | 1 |
Amin, Rohan Mahesh | 1 |
Anderson, Catherine L. | 1 |
Anderson, Jimmeka | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 33 |
Postsecondary Education | 20 |
Elementary Secondary Education | 10 |
Adult Education | 3 |
Two Year Colleges | 3 |
High Schools | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Middle Schools | 1 |
Location
United Kingdom | 7 |
United States | 5 |
Australia | 4 |
Canada | 4 |
Ohio | 4 |
Turkey | 4 |
California | 3 |
Florida | 3 |
Maryland | 3 |
Spain | 3 |
Brazil | 2 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Family Education Loan Program | 1 |
G I Bill | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
Program for International… | 1 |
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Kirk, Sarah; Foreman, Daniel; Lee, Cody; Beasley, Shannon W. – Journal of Cybersecurity Education, Research and Practice, 2019
The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local…
Descriptors: Active Learning, Computer Security, Information Security, Access to Information
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Raposo-Rivas, Manuela; Martínez-Figueira, María-Esther; Sarmiento Campos, José Antonio; Parrilla Latas, Angeles – Digital Education Review, 2021
Adolescents' relationship with technology is controversial both because of the possibilities it offers and because of the risks it entails, even being perceived by them as a real need. In order to improve the knowledge about it, a non-experimental research of transversal style has been carried out using a methodology based on data mining. 1,048…
Descriptors: Adolescents, Student Behavior, Secondary School Students, Internet
Ramu, Gandikota – Education and Information Technologies, 2018
In recent years, the Internet of Things (IoT), cloud computing, and wireless body area networks (WBANs) have converged and become popular due to their potential to improve quality of life. This convergence has greatly promoted the industrialization of e-healthcare. With the flourishing of the e-healthcare industry, full electronic health records…
Descriptors: Internet, Records (Forms), Health Services, Information Management
Coogan, John F. – Journal of Electronic Resources Librarianship, 2019
Resolving user access issues is inherent in managing electronic resources in libraries. The University of Maryland University College (UMUC) Library, situated within a predominantly distance learning-centered institution, has developed a series of web-based technical help pages to facilitate resolution of typical issues reported by its…
Descriptors: Access to Information, Users (Information), Information Management, Technical Support
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Kabadayi, Fedai; Sari, Serkan V. – Journal of Psychologists and Counsellors in Schools, 2018
This study examined the role of resilience in the lives of cyberbullying perpetrators and their victims. Turkish adolescents (n = 444; 245 girls, 55.2%, and 199 boys, 44.8%) 15-19 years of age (mean age of 16.58 years, SD = 0.789) were recruited from different high schools. The participants completed the Cyberbullying Scale (Aricak, Kinay, &…
Descriptors: Resilience (Psychology), Bullying, Computer Security, Victims
US Department of Education, 2021
As a precursor to this annual report, in February 2018, the Department issued its "U.S. Department of Education Strategic Plan for Fiscal Years [FY] 2018-22" ("Strategic Plan") (see ED586968). The "Strategic Plan" establishes four broad, overarching goals--one goal each in the areas of K-12 education, postsecondary…
Descriptors: Public Agencies, Federal Government, Strategic Planning, Educational Planning
Martin, Florence; Wang, Chuang; Petty, Teresa; Wang, Weichao; Wilkins, Patti – Educational Technology & Society, 2018
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and "bring your own technology" initiatives, attention to these topics is becoming increasingly important. A total of 593…
Descriptors: Middle School Students, Social Media, Student Surveys, Bullying