NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Peer reviewed Peer reviewed
Direct linkDirect link
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Matt Paulson – ProQuest LLC, 2021
With the recent proliferation of information technology, almost all users of technology, no matter the field, profession, or status, have experienced a commensurate increase in information security threats. This, in turn, creates a significant concern in higher institutions of public learning. Information Security Officers in public higher…
Descriptors: Higher Education, Information Security, Computer Security, Information Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Reidenberg, Joel R.; Schaub, Florian – Theory and Research in Education, 2018
Education, Big Data, and student privacy are a combustible mix. The improvement of education and the protection of student privacy are key societal values. Big Data and Learning Analytics offer the promise of unlocking insights to improving education through large-scale empirical analysis of data generated from student information and student…
Descriptors: Data Collection, Information Security, Student Records, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Business-Higher Education Forum, 2013
This is the first in a series of Business-Higher Education Forum (BHEF) playbooks intended to assist companies, higher education institutions, private philanthropies, membership associations, professional societies, government agencies, and other stakeholders seeking to understand the potential value of investing in coordinated strategic,…
Descriptors: Higher Education, Labor Force Development, Partnerships in Education, Academic Persistence
Keengwe, Jared – IGI Global, 2013
With advancements in technology continuing to influence all areas of society, students in current classrooms have a different understanding and perspective of learning than the educational system has been designed to teach. Research Perspectives and Best Practices in Educational Technology Integration highlights the emerging digital age, its…
Descriptors: Higher Education, Learner Engagement, Educational Technology, Transformative Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Greller, Wolfgang; Drachsler, Hendrik – Educational Technology & Society, 2012
With the increase in available educational data, it is expected that Learning Analytics will become a powerful means to inform and support learners, teachers and their institutions in better understanding and predicting personal learning needs and performance. However, the processes and requirements behind the beneficial application of Learning…
Descriptors: Foreign Countries, Computer Uses in Education, Ethics, Best Practices
WCET, 2009
This list of best practice strategies is based on "Institutional Policies/Practices and Course Design Strategies to Promote Academic Integrity in Online Education," produced by WCET (WICHE Cooperative for Educational Technologies) in February 2009 and updated in April 2009. In May 2009, the Instructional Technology Council (ITC) surveyed…
Descriptors: Computer Uses in Education, Educational Technology, Online Courses, Instructional Design
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges