Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Software | 9 |
Information Security | 9 |
Student Records | 9 |
Privacy | 8 |
Higher Education | 5 |
Elementary Secondary Education | 4 |
Internet | 4 |
Computer Security | 3 |
Information Systems | 3 |
Academic Achievement | 2 |
Boards of Education | 2 |
More ▼ |
Source
Higher Education Studies | 2 |
National School Boards… | 2 |
Distance Learning | 1 |
EDUCAUSE Review | 1 |
European Journal of Education… | 1 |
Privacy Technical Assistance… | 1 |
Teaching in Higher Education | 1 |
Author
Capo, Berta | 1 |
Chinsook, Kittipong | 1 |
Corn, Michael | 1 |
Czuprynski, Christine N. | 1 |
Jantakoon, Thada | 1 |
Karp, Jason | 1 |
Khajonmote, Withamon | 1 |
Klintawon, Sununta | 1 |
Leamsakul, Wicha | 1 |
Marachi, Roxana | 1 |
McDermott, Maureen | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 4 |
Guides - Non-Classroom | 2 |
Reports - Evaluative | 2 |
Reports - Research | 1 |
Education Level
Postsecondary Education | 6 |
Higher Education | 5 |
Elementary Secondary Education | 4 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Policymakers | 2 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Chinsook, Kittipong; Khajonmote, Withamon; Klintawon, Sununta; Sakulthai, Chaiyan; Leamsakul, Wicha; Jantakoon, Thada – Higher Education Studies, 2022
Big data is an important part of innovation that has recently attracted a lot of interest from academics and practitioners alike. Given the importance of the education industry, there is a growing trend to investigate the role of big data in this field. Much research has been undertaken to date in order to better understand the use of big data in…
Descriptors: Student Behavior, Learning Analytics, Computer Software, Rating Scales
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Privacy Technical Assistance Center, 2014
Today's classrooms increasingly employ on-demand delivery of personalized content, virtual forums for interacting with other students and teachers, and a wealth of other interactive technologies that help foster and enhance the learning process. Online forums help teachers share lesson plans; social media help students collaborate across…
Descriptors: Privacy, Information Security, Online Systems, Internet
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning