Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 5 |
| Since 2007 (last 20 years) | 16 |
Descriptor
| Computer Security | 17 |
| Data Collection | 17 |
| Privacy | 17 |
| Internet | 11 |
| Data Analysis | 8 |
| Information Security | 7 |
| Higher Education | 6 |
| Information Management | 6 |
| Compliance (Legal) | 5 |
| Access to Information | 4 |
| Data | 4 |
| More ▼ | |
Source
Author
| Almes, Guy T. | 2 |
| Lynch, Clifford A. | 2 |
| Zottola, Ralph J. | 2 |
| Barnett, William | 1 |
| Carrie Klein | 1 |
| Corn, Mike | 1 |
| Georgia Zempila | 1 |
| Hillegas, Curt | 1 |
| Hillegas, Curtis W. | 1 |
| Ilci, Ahmet | 1 |
| Jessica Colorado | 1 |
| More ▼ | |
Publication Type
Education Level
| Postsecondary Education | 8 |
| Higher Education | 7 |
| Elementary Secondary Education | 3 |
| Early Childhood Education | 1 |
Audience
| Administrators | 1 |
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| Hawaii | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Family Educational Rights and… | 3 |
| Coronavirus Aid Relief and… | 1 |
| Every Student Succeeds Act… | 1 |
| Individuals with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Carrie Klein; Sean Baser; Jessica Colorado – State Higher Education Executive Officers, 2024
Integrity, security, and sustained investment in data systems are critical for state agencies and stakeholders to effectively harness information to inform policy and decision-making in postsecondary education. Recognizing this crucial need, the State Higher Education Executive Officers Association (SHEEO) has led the charge with its State…
Descriptors: Postsecondary Education, Educational Finance, Governance, Data Collection
Georgia Zempila; Stelios Xinogalos – Discover Education, 2025
The Internet is nowadays an integral part of adolescents' everyday life, bringing several benefits but risks as well. Although adolescents are familiar with technology, there seems to be a gap in their knowledge in safety and data protection on the Internet. So it is clear that adolescents have to be educated on relevant issues and serious games…
Descriptors: Educational Games, Teaching Methods, Internet, Information Security
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
National Forum on Education Statistics, 2022
Digital inequity has been a long-standing issue in the education community. A lack of home internet and technology devices can not only hinder students' ability to access educational resources at home, but can also have a detrimental effect on student achievement. Education agencies have taken steps over the past decades to address digital…
Descriptors: Access to Computers, Technology Uses in Education, Educational Technology, Internet
Pruitt, Kobie – State Education Standard, 2016
Just as adults' personal lives and data are increasingly inhabiting online spaces, so are students. While this shift brings many benefits and the possibility of learning tailored to individual students' needs, it is also brings new challenges. Students create an electronic trail of information that creates an obvious concern: How can they enjoy…
Descriptors: Student Records, Safety, Computer Security, Information Security
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Barnett, William; Corn, Mike; Hillegas, Curt; Wada, Kent – EDUCAUSE, 2015
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
Descriptors: Higher Education, Data Collection, Data Analysis, Information Management
Lynch, Clifford A. – EDUCAUSE, 2015
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
Descriptors: Higher Education, Data Collection, Data Analysis, Information Management
US House of Representatives, 2015
This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…
Descriptors: Privacy, Data Analysis, Information Security, Computer Security
Almes, Guy T.; Zottola, Ralph J. – EDUCAUSE, 2014
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
Descriptors: Data Collection, Data Analysis, Higher Education, Technology Uses in Education
Almes, Guy T.; Hillegas, Curtis W.; Lance, Timothy; Lynch, Clifford A.; Monaco, Gregory E.; Mundrane, Michael R.; Zottola, Ralph J. – EDUCAUSE, 2014
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
Descriptors: Data Collection, Data Analysis, Higher Education, Technology Uses in Education
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Soghoian, Christopher – ProQuest LLC, 2012
Telecommunications carriers and service providers now play an essential role in facilitating modern surveillance by law enforcement agencies. The police merely select the individuals to be monitored, while the actual surveillance is performed by third parties: often the same email providers, search engines and telephone companies to whom consumers…
Descriptors: Telecommunications, Law Enforcement, Internet, Privacy
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Previous Page | Next Page ยป
Pages: 1 | 2
Peer reviewed
Direct link
