Publication Date
In 2025 | 1 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 29 |
Since 2016 (last 10 years) | 68 |
Since 2006 (last 20 years) | 104 |
Descriptor
Confidentiality | 104 |
Information Security | 104 |
Privacy | 64 |
Student Records | 41 |
Access to Information | 27 |
Information Management | 25 |
Data Collection | 24 |
Information Policy | 22 |
Foreign Countries | 20 |
Federal Legislation | 19 |
Computer Security | 17 |
More ▼ |
Source
Author
Ladwig, Christine | 2 |
Schwieger, Dana | 2 |
Adam C. Sales | 1 |
Ahmed Al Zaidy | 1 |
Alexander Skulmowski | 1 |
Alier, Marc | 1 |
Altun, Halis | 1 |
An, Ho | 1 |
Arboledas-Brihuega, David | 1 |
Backherms, Dennis A. | 1 |
Bitterman, Amy | 1 |
More ▼ |
Publication Type
Education Level
Location
Canada | 5 |
United States | 4 |
Australia | 3 |
Ireland | 3 |
United Kingdom | 3 |
Arkansas | 2 |
California | 2 |
Florida | 2 |
Germany | 2 |
India | 2 |
Minnesota | 2 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 2 |
SAT (College Admission Test) | 2 |
General Educational… | 1 |
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Alexander Skulmowski – Educational Psychology Review, 2024
Unnoticed by most, some technology corporations have changed their terms of service to allow user data to be transferred to clouds and even to be used to train artificial intelligence systems. As a result of these developments, remote data collection may in many cases become impossible to be conducted anonymously. Researchers need to react by…
Descriptors: Artificial Intelligence, Ethics, Research, Information Utilization
Joshua M. Rosenberg; Conrad Borchers; Sondra M. Stegenga; Macy A. Burchfield; Daniel Anderson; Christian Fischer – Learning, Media and Technology, 2024
Schools and school districts use social media for a variety of reasons, but alongside the benefits of schools' social media use come potential risks to students' privacy. Using a novel dataset of around 18 million Facebook posts by schools and districts in the United States, we explore the extent to which personally identifiable information of…
Descriptors: Social Media, Elementary Schools, Secondary Schools, Information Security
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Charlotte Z. Mann; Adam C. Sales; Johann A. Gagnon-Bartsch – Grantee Submission, 2025
Combining observational and experimental data for causal inference can improve treatment effect estimation. However, many observational data sets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. Nonetheless, a small amount of risk of disclosing sensitive…
Descriptors: Causal Models, Statistical Analysis, Privacy, Risk
Ramlah Mailok; Haslina Hassan; Che Soh Said; Mashitoh Hashim – International Journal on Social and Education Sciences, 2023
Over recent years, the sharing of personal data among students is uncontrolled, especially on the social media networks, resulting in widespread data intrusions that compromise their privacy and confidentiality. Against this backdrop, this study was conducted to identify the level of knowledge of personal data protection among students. This…
Descriptors: Information Security, Knowledge Level, Foreign Countries, Privacy
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Haque, Mustafizul; Kumar, V. Vijaya; Singh, Preeti; Goyal, Adheer A.; Upreti, Kamal; Verma, Ankit – Education and Information Technologies, 2023
Now a days with the rapidly increasing development of technology and communication system, the implementation of blockchain is continuously increasing in various sectors. With the increase in massive data in educational sectors there arise a requirement of handling such enormous data. This can be easily and securely handled by blockchain…
Descriptors: Meta Analysis, Information Technology, Technology Uses in Education, Technology Integration
Christian Beighton – Sage Research Methods Cases, 2021
This case discusses how scenario-based interviews can be used to develop research into policy and practice. Based on data collected from U.K. further education management settings, it shows how and why scenario-based interviews were used. It also explains how the data collected were then used to illustrate and analyze the implementation of a…
Descriptors: Foreign Countries, Interviews, Vignettes, Policy Formation
Renata Mekovec; Marija Kustelega – International Association for Development of the Information Society, 2024
The demand for privacy specialists is expected to increase, but there is a shortage of them to meet market demands. Certain ICT skills and competencies are required for professionals who develop, manage, and protect data that drive the digital world. The current study explores undergraduate students' attitude about different teaching strategies…
Descriptors: Undergraduate Students, Privacy, Specialists, Demand Occupations
Ghosh, Swagata; Chauhan, Gajendra Singh; Kotwal, Renu – Digital Education Review, 2023
The COVID-19 pandemic has fast-tracked the development of digital applications and inspired everyone to adapt to the technologies to curb the spread of outbreak. As this crisis intensifies, the rapid usage of digital devices and apps has echoed the serious concerns about civil liberties, privacy, and data protection. Considering the situation,…
Descriptors: Foreign Countries, Youth, Digital Literacy, Privacy
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Ranieri, V.; Stynes, H.; Kennedy, E. – Research Ethics, 2021
The Confidentiality Advisory Group (CAG) is a specialised body that advises the Health Research Authority (HRA) and the Secretary of State for Health on requests for access to confidential information, in the absence of informed consent from its owners. Its primary role is to oversee the safe use of such information and to counsel the governing…
Descriptors: Foreign Countries, Advisory Committees, Confidentiality, Access to Information