NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 106 results Save | Export
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Peer reviewed Peer reviewed
Direct linkDirect link
Alexander Skulmowski – Educational Psychology Review, 2024
Unnoticed by most, some technology corporations have changed their terms of service to allow user data to be transferred to clouds and even to be used to train artificial intelligence systems. As a result of these developments, remote data collection may in many cases become impossible to be conducted anonymously. Researchers need to react by…
Descriptors: Artificial Intelligence, Ethics, Research, Information Utilization
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mircea Talu – Journal of Cybersecurity Education, Research and Practice, 2025
The profound impact of the Internet of Things (IoT) on various fronts, is driven by technological advancements, the ubiquitous spread of information, and the emergence of transformative events. IoT presents a diverse array of possibilities within university environments, fostering a more connected and enhanced educational experience. This research…
Descriptors: Computer Security, Technology Uses in Education, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua M. Rosenberg; Conrad Borchers; Sondra M. Stegenga; Macy A. Burchfield; Daniel Anderson; Christian Fischer – Learning, Media and Technology, 2024
Schools and school districts use social media for a variety of reasons, but alongside the benefits of schools' social media use come potential risks to students' privacy. Using a novel dataset of around 18 million Facebook posts by schools and districts in the United States, we explore the extent to which personally identifiable information of…
Descriptors: Social Media, Elementary Schools, Secondary Schools, Information Security
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Charlotte Z. Mann; Adam C. Sales; Johann A. Gagnon-Bartsch – Grantee Submission, 2025
Combining observational and experimental data for causal inference can improve treatment effect estimation. However, many observational data sets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. Nonetheless, a small amount of risk of disclosing sensitive…
Descriptors: Causal Models, Statistical Analysis, Privacy, Risk
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – Problems of Education in the 21st Century, 2025
Without regulations for higher education institutions in the metaverse, ethical transgressions are unavoidable. Educational metaverse systems, which integrate artificial intelligence, essentially depend on big data as their core technology, leading to considerable privacy issues. Therefore, this study examines data privacy and security issues, a…
Descriptors: Higher Education, Information Security, Privacy, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ramlah Mailok; Haslina Hassan; Che Soh Said; Mashitoh Hashim – International Journal on Social and Education Sciences, 2023
Over recent years, the sharing of personal data among students is uncontrolled, especially on the social media networks, resulting in widespread data intrusions that compromise their privacy and confidentiality. Against this backdrop, this study was conducted to identify the level of knowledge of personal data protection among students. This…
Descriptors: Information Security, Knowledge Level, Foreign Countries, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Haque, Mustafizul; Kumar, V. Vijaya; Singh, Preeti; Goyal, Adheer A.; Upreti, Kamal; Verma, Ankit – Education and Information Technologies, 2023
Now a days with the rapidly increasing development of technology and communication system, the implementation of blockchain is continuously increasing in various sectors. With the increase in massive data in educational sectors there arise a requirement of handling such enormous data. This can be easily and securely handled by blockchain…
Descriptors: Meta Analysis, Information Technology, Technology Uses in Education, Technology Integration
Christian Beighton – Sage Research Methods Cases, 2021
This case discusses how scenario-based interviews can be used to develop research into policy and practice. Based on data collected from U.K. further education management settings, it shows how and why scenario-based interviews were used. It also explains how the data collected were then used to illustrate and analyze the implementation of a…
Descriptors: Foreign Countries, Interviews, Vignettes, Policy Formation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Renata Mekovec; Marija Kustelega – International Association for Development of the Information Society, 2024
The demand for privacy specialists is expected to increase, but there is a shortage of them to meet market demands. Certain ICT skills and competencies are required for professionals who develop, manage, and protect data that drive the digital world. The current study explores undergraduate students' attitude about different teaching strategies…
Descriptors: Undergraduate Students, Privacy, Specialists, Demand Occupations
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ghosh, Swagata; Chauhan, Gajendra Singh; Kotwal, Renu – Digital Education Review, 2023
The COVID-19 pandemic has fast-tracked the development of digital applications and inspired everyone to adapt to the technologies to curb the spread of outbreak. As this crisis intensifies, the rapid usage of digital devices and apps has echoed the serious concerns about civil liberties, privacy, and data protection. Considering the situation,…
Descriptors: Foreign Countries, Youth, Digital Literacy, Privacy
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8