NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Christopher H. Clark, Editor; Cathryn van Kessel, Editor – Teachers College Press, 2025
Whether skeptical or enthusiastic about AI, every social studies educator will find something useful for their practice in this book. The introduction of widely available generative AI tools has caused a frenzy of both positive and negative reactions. Between utopian visions and apocalyptic predictions of AI's impact on education, there is a need…
Descriptors: Social Studies, Artificial Intelligence, Technology Uses in Education, Computer Software
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Office of Educational Technology, US Department of Education, 2024
The U.S. Department of Education is committed to supporting innovative advances in educational technology to improve teaching and learning across the nation's education systems and to support educators as they incorporate emerging technology into their learning communities. Artificial Intelligence (AI) in education is a complex and rapidly…
Descriptors: Equal Education, Artificial Intelligence, Computer Software, Technology Integration
Hamilton, Clovia; Swart, William; Stokes, Gerald M. – Online Submission, 2021
We address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence, the ongoing research in Artificial Cognitive Assistants, and the explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri, spurred on by…
Descriptors: Rating Scales, Ethics, Compliance (Legal), Artificial Intelligence
Council of the Great City Schools, 2017
Equipping today's children with 21st century skills for the digital age requires turning traditional classrooms into a digital-learning ecosystem and ensuring teachers have professional skills and unfettered access to tools they need for 21st century teaching and learning. School district networks are being used for instruction, business, and…
Descriptors: Information Security, Educational Technology, Information Management, Networks
Office of Planning, Evaluation and Policy Development, US Department of Education, 2018
The National Study of English Learners and Digital Learning Resources conducted by the U.S. Department of Education, Policy and Program Studies Service, on behalf of the Office of English Language Acquisition and the Office of Educational Technology provided the first national data on how educators across the country are using educational…
Descriptors: Educational Technology, English Language Learners, Second Language Instruction, Adoption (Ideas)
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Fleming, Antoine – ProQuest LLC, 2017
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…
Descriptors: Information Security, Case Studies, Qualitative Research, Holistic Approach
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)