Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 6 |
Descriptor
Accountability | 6 |
Computer Security | 6 |
Information Security | 6 |
Computer Networks | 3 |
Elementary Secondary Education | 3 |
Access to Information | 2 |
Correlation | 2 |
Crime | 2 |
Educational Legislation | 2 |
Federal Legislation | 2 |
Models | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Grantee Submission | 1 |
Office of Inspector General,… | 1 |
State Education Standard | 1 |
US Department of Education | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Journal Articles | 1 |
Numerical/Quantitative Data | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 3 |
Higher Education | 2 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Policymakers | 1 |
Location
California | 1 |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Elementary and Secondary… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement