Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 16 |
Descriptor
Source
Author
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 6 |
Reports - Research | 6 |
Dissertations/Theses -… | 4 |
Guides - Non-Classroom | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 11 |
Postsecondary Education | 11 |
Elementary Secondary Education | 3 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Two Year Colleges | 1 |
Audience
Policymakers | 1 |
Teachers | 1 |
Location
Pennsylvania | 16 |
Indiana | 3 |
Maryland | 3 |
Virginia | 3 |
Wisconsin | 3 |
Canada | 2 |
Florida | 2 |
Maine | 2 |
Massachusetts | 2 |
Michigan | 2 |
Nebraska | 2 |
More ▼ |
Laws, Policies, & Programs
Health Insurance Portability… | 2 |
Digital Millennium Copyright… | 1 |
Elementary and Secondary… | 1 |
Family Educational Rights and… | 1 |
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Haywood, M. Elizabeth – Journal of Information Systems Education, 2021
ISACA, a non-profit, independent association that advocates for professionals involved in information security, assurance, risk management, and governance, recently updated its IT governance framework, Control Objectives for Information and Related Technology (COBIT). COBIT 2019 presents a logical approach to information technology and policy…
Descriptors: Community Colleges, Crime, Computer Security, Information Technology
Hartman-Caverly, Sarah; Chisholm, Alexandria; Glenn, Alexandrea – College & Research Libraries, 2023
This qualitative, evaluative case study details the conceptual framing, development, delivery, and assessment of a privacy literacy workshop called Digital Shred. The workshop is a multi-institutional effort offered initially in-person in fall 2019 and adapted to virtual delivery in fall 2020. The conceptual framework underlying the workshop…
Descriptors: Privacy, Workshops, Academic Libraries, Digital Literacy
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Kamara, Kesselly Sheick – ProQuest LLC, 2019
The problem addressed by this study is the strategies analysts need in higher education institutions to improve the protection of personally identifiable and sensitive data. The qualitative exploratory design was used to examine the strategies used by nine analysts. The combined experience of the nine analysts in data analytics, cyber security,…
Descriptors: Higher Education, Information Security, Privacy, Ownership
Johnson-Huber, Cariann – ProQuest LLC, 2021
Background: Today's healthcare organizations face financial and educational challenges of sustaining electronic medical record (EMR) advancements and regulatory reporting mandates. One such mandate is providing EMR education in the Operating Room (OR) setting to support reporting compliance and patient safety. Local Problem: At a multi-state…
Descriptors: Accuracy, Video Technology, Medical Education, Nursing Education
Fox, Christine; Jones, Rachel – State Educational Technology Directors Association, 2018
This publication highlights how state policies and guidance are supporting the transformation to personalized learning through digital instructional materials. Specifically, the report includes personalized learning approaches and the policies and processes around the selection, curation, procurement, professional learning and funding of digital…
Descriptors: State Policy, Individualized Instruction, Educational Technology, Technology Uses in Education
Zimmerman, Melisa S. – ProQuest LLC, 2014
The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…
Descriptors: Social Networks, Crime, College Students, Information Security
Amigud, Alexander – International Review of Research in Open and Distance Learning, 2013
Physical separation of students and instructors creates the gap of anonymity and limited control over the remote learning environment. The ability of academic institutions to authenticate students and validate authorship of academic work at various points during a course is necessary for preserving not only perceived credibility but also public…
Descriptors: Foreign Countries, Distance Education, Higher Education, Information Security
Reis, David W. – ProQuest LLC, 2012
Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…
Descriptors: Information Security, Federal Legislation, Compliance (Legal), Hospitals
Hipsky, Shellie; Younes, Wiam – International Journal of Information and Communication Technology Education, 2015
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Descriptors: Elementary School Teachers, Secondary School Teachers, Teacher Attitudes, Privacy
Data Quality Campaign, 2016
Every state can create secure, robust linkages between early childhood and K-12 data systems, and effectively use the information from these linkages to implement initiatives to support programs and children, answer key policy questions, and be transparent about how the state's early childhood investments prepare students for success in school and…
Descriptors: Early Childhood Education, Elementary School Curriculum, Data, Program Implementation
Picciano, Anthony G. – Journal of Asynchronous Learning Networks, 2012
Data-driven decision making, popularized in the 1980s and 1990s, is evolving into a vastly more sophisticated concept known as big data that relies on software approaches generally referred to as analytics. Big data and analytics for instructional applications are in their infancy and will take a few years to mature, although their presence is…
Descriptors: Higher Education, Decision Making, Data, Data Analysis
Gemin, Butch; Pape, Larry; Vashaw, Lauren; Watson, John – Evergreen Education Group, 2015
Online learning has steadily become a more integral strategy for schools and districts in their efforts to offer students greater access to the courses they need. Where in the past, much of the online learning activity happened at the state level or regional level, more and more schools are exercising greater control over their online and digital…
Descriptors: Elementary Secondary Education, Electronic Learning, Educational Policy, Educational Practices
Lum, Lydia – CURRENTS, 2012
At the end of 2010, for the first time ever, smartphones outsold PCs. Mobile device adoption rates continue to rise rapidly around the world. A recent forecast by Cisco found that global mobile data traffic more than doubled last year, and by the end of 2012, the number of mobile devices in use will outnumber the world's population. In the United…
Descriptors: Foreign Countries, Higher Education, Community Colleges, Institutional Advancement
Previous Page | Next Page ยป
Pages: 1 | 2