Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 14 |
Descriptor
Source
Author
Alexander Skulmowski | 1 |
Arboledas-Brihuega, David | 1 |
Chittenden, Lloyd | 1 |
Clapper, Danial L. | 1 |
Ford, Janet C. | 1 |
Haywood Gelman | 1 |
Jameson, Daphne A. | 1 |
Kennedy, E. | 1 |
Lisa Mckee | 1 |
O'Hara, Amy | 1 |
Oliver, Astrid | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 14 |
Journal Articles | 9 |
Numerical/Quantitative Data | 2 |
Opinion Papers | 1 |
Education Level
Postsecondary Education | 6 |
Higher Education | 5 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Policymakers | 1 |
Location
Australia | 1 |
Canada | 1 |
Colorado | 1 |
North Carolina | 1 |
Ohio | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 5 |
American Recovery and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Alexander Skulmowski – Educational Psychology Review, 2024
Unnoticed by most, some technology corporations have changed their terms of service to allow user data to be transferred to clouds and even to be used to train artificial intelligence systems. As a result of these developments, remote data collection may in many cases become impossible to be conducted anonymously. Researchers need to react by…
Descriptors: Artificial Intelligence, Ethics, Research, Information Utilization
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Ranieri, V.; Stynes, H.; Kennedy, E. – Research Ethics, 2021
The Confidentiality Advisory Group (CAG) is a specialised body that advises the Health Research Authority (HRA) and the Secretary of State for Health on requests for access to confidential information, in the absence of informed consent from its owners. Its primary role is to oversee the safe use of such information and to counsel the governing…
Descriptors: Foreign Countries, Advisory Committees, Confidentiality, Access to Information
Smith, Marcus; Walsh, Patrick – Journal of Higher Education Policy and Management, 2023
This article critically considers these recent developments and political context, proposing an approach to manage sensitive research in the complex contemporary political environment. The first part of the article defines security-sensitive research as research having risk associated with foreign interference, cybersecurity, biosecurity or…
Descriptors: Foreign Countries, Research, Higher Education, Confidentiality
O'Hara, Amy – Institute for Higher Education Policy, 2019
Our current federal postsecondary data system is incomplete and fails to provide today's students with the accurate, timely information that they need to inform their college choices and promote their success. As policymakers consider proposals to improve this federal data system, they should model best practices of responsible data-use to ensure…
Descriptors: Postsecondary Education, Information Dissemination, Information Management, Information Security
Privacy Technical Assistance Center, 2020
The Student Privacy Policy Office (SPPO) is performing a four-year review of a sample of the websites of 1,504 local education agencies (LEAs) to identify whether and how these websites include information about student privacy. In each year of the study, SPPO is reviewing a nationally representative sample of 376 LEA websites, focusing on whether…
Descriptors: Privacy, School Districts, Web Sites, Educational Legislation
Privacy Technical Assistance Center, 2020
The U.S. Department of Education's (Department's or ED's) Student Privacy Policy Office (SPPO) and its Privacy Technical Assistance Center (PTAC) are conducting a four-year review of the websites of 1,504 Local Education Agencies (LEAs) to identify whether and how these websites include information on student privacy. The review is part of ED's…
Descriptors: Privacy, Student Records, Information Security, Web Sites
Arboledas-Brihuega, David – Journal of Technology and Science Education, 2019
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in…
Descriptors: Mathematics, Curriculum Implementation, Active Learning, Student Projects
Reidenberg, Joel R.; Schaub, Florian – Theory and Research in Education, 2018
Education, Big Data, and student privacy are a combustible mix. The improvement of education and the protection of student privacy are key societal values. Big Data and Learning Analytics offer the promise of unlocking insights to improving education through large-scale empirical analysis of data generated from student information and student…
Descriptors: Data Collection, Information Security, Student Records, Privacy
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Canadian Association of University Teachers, 2015
Bill C-51, the Canadian federal government's "Anti-Terrorism Act," has sparked serious concerns about the potential impact on the basic civil liberties of all Canadians. The proposed legislation would establish criminal offences that infringe upon the right to free expression. Security agencies would be granted unprecedented and…
Descriptors: Academic Freedom, Freedom of Speech, Campuses, College Environment
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Jameson, Daphne A. – Business and Professional Communication Quarterly, 2014
When Chiquita Brands considered relocating its corporate headquarters, competing cities started Twitter campaigns to influence the decision by communicating directly with the chief executive officer. As he used the new microblogging channel, some of his previously private communication became public, some personal communication became…
Descriptors: Business Communication, Communication Strategies, Social Networks, Web 2.0 Technologies
Data Quality Campaign, 2011
This letter is submitted to comment on the U.S. Department of Education's (ED) proposed revisions to the American Recovery and Reinvestment Act's (ARRA) State Fiscal Stabilization Fund (SFSF), as published in the September 23, 2011, Federal Register. Overall, the Data Quality Campaign believes the proposed changes strike a sensible balance: they…
Descriptors: Stakeholders, Federal Aid, Accountability, Educational Finance