Publication Date
| In 2026 | 0 |
| Since 2025 | 20 |
| Since 2022 (last 5 years) | 66 |
| Since 2017 (last 10 years) | 109 |
| Since 2007 (last 20 years) | 209 |
Descriptor
Source
Author
| Jenay Robert | 3 |
| Martin, Florence | 3 |
| Almes, Guy T. | 2 |
| Berson, Ilene R. | 2 |
| Berson, Michael J. | 2 |
| Corn, Michael | 2 |
| Florence Martin | 2 |
| Foster, Andrea L. | 2 |
| Gezer, Tuba | 2 |
| Grush, Mary | 2 |
| Jamie Reeves | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Canada | 7 |
| Turkey | 7 |
| United Kingdom | 5 |
| United States | 5 |
| Australia | 4 |
| California | 4 |
| Massachusetts | 4 |
| North Carolina | 4 |
| Ohio | 4 |
| Pennsylvania | 4 |
| Brazil | 3 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Guerry, Richard – Education Digest: Essential Readings Condensed for Quick Review, 2012
Most discussions about keeping kids safe online center around two issues: (1) With the rapid development and dissemination of digital technology, how can we stay ahead of what our students are doing?; and (2) What controls are available to prevent students from visiting inappropriate sites? These are reasonable questions, but they ignore two…
Descriptors: Internet, Accountability, Bullying, Computers
Hipsky, Shellie; Younes, Wiam – International Journal of Information and Communication Technology Education, 2015
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Descriptors: Elementary School Teachers, Secondary School Teachers, Teacher Attitudes, Privacy
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Wespieser, Karen – National Foundation for Educational Research, 2015
This report looks at the online activities of London's young people. The report highlights that children and young people use technology to have fun, study and communicate with others. Most children and young people have positive experiences online. On the whole they are sensible online and do not put themselves "at risk". However, the…
Descriptors: Foreign Countries, Internet, Children, Youth
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Mantiri, Franky – Universal Journal of Educational Research, 2014
This essay explores the use of computer technology and multimedia in students learning. Undoubtedly, the advent of computer technology has changed the way humans learn and do things. Moreover, "Computer has become standard equipment" (Bitter & Pierson, 2002) in everyday life. The ability to process data in a real time has helped…
Descriptors: Technology Uses in Education, Multimedia Materials, Information Technology, Computers
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
Belcher, Kenneth L., II – ProQuest LLC, 2012
The cost of the American healthcare system has escalated to the point that the United States spends more per patient than any other country. Based on the cost controls and increase in efficiency seen in other industries, many agree that information technology solutions should be adopted by the American healthcare industry. However, healthcare…
Descriptors: Qualitative Research, Barriers, Health Services, Information Technology
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement
Li, Xin – ProQuest LLC, 2011
In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…
Descriptors: Privacy, Genetics, Biomedicine, Biology

Direct link
Peer reviewed
