Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 11 |
Since 2016 (last 10 years) | 17 |
Since 2006 (last 20 years) | 27 |
Descriptor
Information Security | 27 |
Foreign Countries | 20 |
Privacy | 15 |
Information Technology | 8 |
Computer Security | 7 |
Information Management | 7 |
Access to Information | 6 |
Data Collection | 6 |
Risk | 6 |
Higher Education | 5 |
Internet | 5 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 9 |
Postsecondary Education | 8 |
Elementary Secondary Education | 4 |
Early Childhood Education | 2 |
Elementary Education | 2 |
Kindergarten | 2 |
Primary Education | 2 |
Adult Education | 1 |
Grade 1 | 1 |
High School Equivalency… | 1 |
Audience
Policymakers | 1 |
Researchers | 1 |
Location
United States | 27 |
Canada | 8 |
Australia | 6 |
China | 5 |
United Kingdom | 5 |
European Union | 3 |
Germany | 3 |
Portugal | 3 |
South Korea | 3 |
Austria | 2 |
Belgium | 2 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
General Educational… | 1 |
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Ezeugo, Ernest; Klein, Carrie; Whitfield, Christina – State Higher Education Executive Officers, 2021
State postsecondary data systems contain a wealth of information--including detailed records about individuals--that allow states to analyze and improve their postsecondary education systems. The entities that maintain these systems operate in a context of concern about the privacy and security of educational records. They have both an interest in…
Descriptors: Privacy, Information Security, Information Systems, Postsecondary Education
Christopher H. Clark, Editor; Cathryn van Kessel, Editor – Teachers College Press, 2025
Whether skeptical or enthusiastic about AI, every social studies educator will find something useful for their practice in this book. The introduction of widely available generative AI tools has caused a frenzy of both positive and negative reactions. Between utopian visions and apocalyptic predictions of AI's impact on education, there is a need…
Descriptors: Social Studies, Artificial Intelligence, Technology Uses in Education, Computer Software
Fernández-Molina, Juan-Carlos; Eschenfelder, Kristin R.; Rubel, Alan P. – College & Research Libraries, 2021
This paper describes the results of a study to compare contemporary e-journal licenses from two research universities in the United States and Spain in terms of e-reserves, interlibrary loan, text and data mining, authors' rights and treatment of copyright exceptions, usage statistics, governing law, data privacy, and obligations entailing…
Descriptors: Foreign Countries, Academic Libraries, Research Universities, Electronic Journals
Chan, Victor K. Y. – International Association for Development of the Information Society, 2023
From the standpoint of a MOOC practitioner (i.e., a MOOC provider) instead of a rigorous comparative law researcher, this article attempts to analyze the potential legal issues and risks underlying instruction via MOOCs and compare these legal issues and risks between the small jurisdiction Macao and such major jurisdictions as the United States,…
Descriptors: MOOCs, Cross Cultural Studies, Laws, Privacy
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Data Quality Campaign, 2022
Each year, state legislators craft new policies that drive data use across their states, and as part of a comprehensive review of state education data legislation, the Data Quality Campaign (DQC) keeps track. In 2022, state legislators introduced 131 bills in 35 states--42 of which became law in 17 states-- that would govern the use of data along…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
Opesade, Adeola O.; Adesina, Omolayo A. – Journal of Cybersecurity Education, Research and Practice, 2020
The use of the Internet among children and adolescents is now a norm in many parts of the world. As the Internet offers a wide range of benefits to these ones, so does it expose them to possible various risks and harm. Researchers in different countries across the world have engaged in the production of relevant research-based knowledge in order…
Descriptors: Internet, Computer Security, Information Security, Children
Long, Kyle A.; O'Connell, Carly – Journal of Comparative and International Higher Education, 2022
In recent years, news media have increased reporting about alleged foreign interference in universities worldwide. A flurry of new policies has followed. This article reviews discourse and policy on foreign interference in higher education in select countries. It identifies the alleged perpetrators and victims, the victims' concerns and responses,…
Descriptors: Public Policy, International Relations, Foreign Countries, Policy
Khalil, Mohammad; Prinsloo, Paul; Slade, Sharon – International Review of Research in Open and Distributed Learning, 2018
While many strategies for protecting personal privacy rely on regulatory frameworks, consent, and anonymizing data, they are not always effective. Terms and Conditions often lag behind advances in technology, software, and user behaviours, and consent to use data for a range of unclear purposes may be provided unwittingly. As the commercial market…
Descriptors: Large Group Instruction, Online Courses, Educational Technology, Technology Uses in Education
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Melton, James; Miller, Robert; Salmona, Michelle – Journal of Technical Writing and Communication, 2018
Technical and professional communication instruction is well suited to helping students develop digital literacy but must be informed by research regarding how students are using specific social media platforms, particularly the propensity to post content that could damage their career capital. This study examined this question for students in…
Descriptors: Foreign Countries, Comparative Education, Undergraduate Students, Social Media
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Olijnyk, Nicholas Victor – ProQuest LLC, 2014
The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…
Descriptors: Information Security, Research Methodology, Scholarship, Specialization
Previous Page | Next Page »
Pages: 1 | 2