Publication Date
In 2025 | 2 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 10 |
Since 2016 (last 10 years) | 22 |
Since 2006 (last 20 years) | 30 |
Descriptor
Foreign Countries | 30 |
Information Security | 30 |
Privacy | 10 |
Educational Technology | 8 |
Higher Education | 8 |
Barriers | 6 |
Ethics | 6 |
Internet | 6 |
Computer Security | 5 |
Data Analysis | 5 |
Educational Policy | 5 |
More ▼ |
Source
Author
Amiraullt, Ray J. | 1 |
Andrew Hope | 1 |
Annette Bamberger | 1 |
Argyro Chatzopoulou | 1 |
Ayça Atabey | 1 |
Bakardjieva, Teodora | 1 |
Barnes, Amy | 1 |
Bencheva, Nina | 1 |
Bultmann, Mareike | 1 |
Cathryn van Kessel, Editor | 1 |
Chan, Victor K. Y. | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 30 |
Journal Articles | 20 |
Speeches/Meeting Papers | 4 |
Books | 1 |
Collected Works - General | 1 |
Numerical/Quantitative Data | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 14 |
Postsecondary Education | 14 |
Elementary Secondary Education | 2 |
Secondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
United Kingdom | 6 |
Australia | 5 |
European Union | 5 |
United States | 5 |
Canada | 3 |
Europe | 3 |
Bulgaria | 2 |
Germany | 2 |
New Zealand | 2 |
Russia | 2 |
Asia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Annette Bamberger; Tien-Yin Huang – Journal of Education Policy, 2025
This paper analyses the EU's approach to international research cooperation between 2012-2022 drawing on critical geopolitical perspectives and the spatial politics of (re)bordering. It identifies two periods which represent the EU's shifting approaches to international research cooperation from the pursuit of a liberal agenda promoting…
Descriptors: Foreign Countries, Neoliberalism, International Cooperation, Research Administration
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Christopher H. Clark, Editor; Cathryn van Kessel, Editor – Teachers College Press, 2025
Whether skeptical or enthusiastic about AI, every social studies educator will find something useful for their practice in this book. The introduction of widely available generative AI tools has caused a frenzy of both positive and negative reactions. Between utopian visions and apocalyptic predictions of AI's impact on education, there is a need…
Descriptors: Social Studies, Artificial Intelligence, Technology Uses in Education, Computer Software
Ranieri, V.; Stynes, H.; Kennedy, E. – Research Ethics, 2021
The Confidentiality Advisory Group (CAG) is a specialised body that advises the Health Research Authority (HRA) and the Secretary of State for Health on requests for access to confidential information, in the absence of informed consent from its owners. Its primary role is to oversee the safe use of such information and to counsel the governing…
Descriptors: Foreign Countries, Advisory Committees, Confidentiality, Access to Information
Chan, Victor K. Y. – International Association for Development of the Information Society, 2023
From the standpoint of a MOOC practitioner (i.e., a MOOC provider) instead of a rigorous comparative law researcher, this article attempts to analyze the potential legal issues and risks underlying instruction via MOOCs and compare these legal issues and risks between the small jurisdiction Macao and such major jurisdictions as the United States,…
Descriptors: MOOCs, Cross Cultural Studies, Laws, Privacy
van Deursen, Stijn; Kummeling, Henk – Higher Education: The International Journal of Higher Education Research, 2019
The Chinese New Silk Road initiative offers unique opportunities for setting up Sino-European research collaborations. Academic cooperation between countries that are rooted in completely different legal, cultural, and academic backgrounds might however also create new challenges. This article investigates the impact of these differences in the…
Descriptors: Foreign Countries, International Cooperation, Information Security, Scientific Research
Shklyar, Tatiana L.; Popova, Anna V.; Gorokhova, Svetlana S. – Journal of Educational Psychology - Propositos y Representaciones, 2020
In this article authors suggest considering features of hybrid reality, both in psychology and in law. The authors investigate the opportunities and dangers of the virtual world. They reveal the main psychological aspects that provoke the person to plunge into Internet space. Also in the article, the authors show the main tendencies and the…
Descriptors: Psychology, Laws, Computer Simulation, Internet
Smith, Marcus; Walsh, Patrick – Journal of Higher Education Policy and Management, 2023
This article critically considers these recent developments and political context, proposing an approach to manage sensitive research in the complex contemporary political environment. The first part of the article defines security-sensitive research as research having risk associated with foreign interference, cybersecurity, biosecurity or…
Descriptors: Foreign Countries, Research, Higher Education, Confidentiality
Laulaupea'alu, Siuta – Waikato Journal of Education, 2021
Learning online from home bubbles through the use of information communication technology (ICT) stretches the engagement and enactment of "va" (relational connections) between students and lecturers as well as Pacific people in the community. In this paper, "talanoa" is used to capture students' online learning experiences and…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Amiraullt, Ray J. – Quarterly Review of Distance Education, 2019
The educational setting has been the backdrop for numerous debates as far back as recorded history. Today's educational setting, however, contains technological elements so advanced that they by their very nature bring with them a series of highly significant implications which educators have never before been required to address. These issues…
Descriptors: Educational Technology, Technology Uses in Education, Ownership, Privacy
Goger, Annelies; Parco, Allyson; Vegas, Emiliana – Brookings Institution, 2022
The rapid expansion of new technologies into every sector has contributed to the proliferation of alternative models of education, learning, and skill signaling in global labor markets. From digital badges to bootcamps to learning and employment records (LERs), a wide range of public, private, and nonprofit initiatives and platforms have emerged…
Descriptors: Technological Literacy, Information Technology, Credentials, Information Storage
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Cross, Donna; Barnes, Amy – International Journal of Emotional Education, 2018
The Cyber Friendly Schools Project was an innovative longitudinal study which engaged young people themselves in the process of developing and implementing whole-school strategies to reduce cyberbullying-related harm in Australian schools. This postscript describes how our research has developed since our findings were published in 2015, and…
Descriptors: Computer Mediated Communication, Bullying, Foreign Countries, Prevention
Previous Page | Next Page »
Pages: 1 | 2