NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Practitioners2
What Works Clearinghouse Rating
Showing 1 to 15 of 22 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Vanessa Miller – Educational Researcher, 2025
The surveillance and securitization of schools has transformed over the last decade to include predictive analytics and algorithms. In Florida, for example, the Pasco Sheriff's Office used school record data sets to identify and monitor youth they believed were "destined for a life of crime." Yet the extent of big data policing as a…
Descriptors: Elementary Secondary Education, Student Rights, Student Records, Confidential Records
Peer reviewed Peer reviewed
Direct linkDirect link
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Tucker, William; Long, Don – National Association of State Boards of Education, 2018
With roots in student-centered pedagogies that go back at least to the 1900s, personalized learning meets students' learning goals, needs, context, and pace while incorporating their interests and preferences. Personalized learning in today's classroom depends upon and creates an abundance of rich student data, which simultaneously fosters new…
Descriptors: Data Collection, Data Analysis, Student Records, Individualized Instruction
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Council of the Great City Schools, 2017
Equipping today's children with 21st century skills for the digital age requires turning traditional classrooms into a digital-learning ecosystem and ensuring teachers have professional skills and unfettered access to tools they need for 21st century teaching and learning. School district networks are being used for instruction, business, and…
Descriptors: Information Security, Educational Technology, Information Management, Networks
Florida Department of Education, 2021
This technical assistance paper provides policy and guidance to individuals with test administration responsibilities in adult education programs. The Florida assessment policies and guidelines presented in this technical assessment paper are appropriate for state and federal reporting. Therefore, guidance and procedures regarding the selection…
Descriptors: Technical Assistance, Adult Education, Educational Assessment, State Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Calhoun, Cheryl D. – Community College Journal of Research and Practice, 2017
The main goal of this project is to expand cybersecurity curriculum. This was accomplished by developing six new courses. The curriculum for each course utilized a common online course for all class formats including web-enhanced, hybrid, or online. In this article, we will discuss the online components used, faculty professional development, and…
Descriptors: Blended Learning, Information Security, Community Colleges, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Griffiths, Barry J. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2015
For countries to remain competitive in the global economy, it is important to cultivate the next generation of native mathematicians. However, this goal has been increasingly challenging in the United States where, despite the tremendous increase in university enrollment during recent decades, the number of students studying mathematics has…
Descriptors: Summer Programs, Mathematics Education, Program Effectiveness, Academically Gifted
Florida Department of Education, 2019
This technical assistance paper provides policy and guidance to individuals with test administration responsibilities in adult education programs. The Florida assessment policies and guidelines presented in this paper are appropriate for state and federal reporting. Therefore, guidance and procedures regarding the selection and use of appropriate…
Descriptors: Adult Education, Educational Assessment, State Policy, Program Evaluation
Florida Department of Education, 2018
This technical assistance paper provides policy and guidance to individuals with test administration responsibilities in adult education programs. Rule 6A-6.014, Florida Administrative Code (F.A.C.), titled, General Requirements for Adult General Education Programs, requires all adult education programs to report all student measurable educational…
Descriptors: Adult Education, State Policy, Educational Assessment, Program Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Hunter, Gerald P.; Williamson, Stephanie; Wilks, Asa; Hanley, Janet M.; Stecher, Brian M. – RAND Corporation, 2020
The Intensive Partnerships for Effective Teaching initiative, which was funded by the Bill & Melinda Gates Foundation, was a multiyear effort to improve student outcomes--particularly high school graduation and college attendance among low-income minority students--by increasing student access to effective teaching. The RAND Corporation worked…
Descriptors: Data Collection, Data Use, Instructional Effectiveness, Teacher Effectiveness
Fox, Christine; Jones, Rachel – State Educational Technology Directors Association, 2018
This publication highlights how state policies and guidance are supporting the transformation to personalized learning through digital instructional materials. Specifically, the report includes personalized learning approaches and the policies and processes around the selection, curation, procurement, professional learning and funding of digital…
Descriptors: State Policy, Individualized Instruction, Educational Technology, Technology Uses in Education
Previous Page | Next Page ยป
Pages: 1  |  2