Publication Date
In 2025 | 4 |
Since 2024 | 21 |
Since 2021 (last 5 years) | 84 |
Since 2016 (last 10 years) | 148 |
Since 2006 (last 20 years) | 196 |
Descriptor
Higher Education | 196 |
Information Security | 196 |
Privacy | 63 |
Information Technology | 62 |
Computer Security | 59 |
Foreign Countries | 57 |
Technology Uses in Education | 37 |
Barriers | 36 |
Elementary Secondary Education | 36 |
Educational Technology | 35 |
Compliance (Legal) | 34 |
More ▼ |
Source
Author
Jackowicz, Stephen, Ed. | 3 |
Prinsloo, Paul | 3 |
Sahin, Ismail, Ed. | 3 |
Armstrong, John | 2 |
Grajek, Susan | 2 |
Hamilton, Clovia | 2 |
He, Wu | 2 |
Jenay Robert | 2 |
Slade, Sharon | 2 |
Smith, Peter, Ed. | 2 |
Tsado, Lucy | 2 |
More ▼ |
Publication Type
Education Level
Location
United Kingdom | 8 |
Maryland | 7 |
Canada | 6 |
European Union | 5 |
Saudi Arabia | 5 |
United States | 5 |
Australia | 4 |
California | 4 |
China | 4 |
Germany | 4 |
Kentucky | 4 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Brian Khoa Ngac – ProQuest LLC, 2024
Curriculum development is currently being done in a variety of ways: individually, with peers, through an academic committee that may or may not have an industry representative, or through workshops. But the current ways of developing curriculum have challenges and inefficiencies, specifically when using groups and committee (logistical…
Descriptors: Expertise, Cooperation, Curriculum Development, Computer Security
Integration of Industry 4.0 Technologies with Education 4.0: Advantages for Improvements in Learning
Moraes, Eduardo Baldo; Kipper, Liane Mahlmann; Hackenhaar Kellermann, Ana Clara; Austria, Leonardo; Leivas, Pedro; Moraes, Jorge André Ribas; Witczak, Marcus – Interactive Technology and Smart Education, 2023
Purpose: The purpose of this study is to identify the uses of Industry 4.0 technologies in the area of education and how they contribute to learning in addition to highlighting at what educational level they are used. Design/methodology/approach: A systematic literature review was carried out in the Scopus (Elsevier), Web of Science and…
Descriptors: Educational Technology, Internet, Computer Simulation, Higher Education
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Paula Cristina R. Azevedo; Christine B. Valadez – Impacting Education: Journal on Transforming Professional Practice, 2025
Artificial Intelligence (AI) has seen a significant rise in public use since the release of ChatGPT in November of 2022. Higher education institutions (HEI) have struggled to negotiate how best to manage AI technologies within their academic communities, acknowledging both positive and negative impacts of AI on education. Focused primarily on…
Descriptors: Higher Education, Artificial Intelligence, Technology Uses in Education, Educational Policy
JoEllen Renee Price – ProQuest LLC, 2022
This dissertation is aimed at assisting higher education leaders, IT professionals, and administrators in understanding data security risks that institutions face and how employee understanding and behavior can increase or reduce data security risk. The study aims to measure the relationship between financial aid administrator data security…
Descriptors: Information Security, Information Technology, Student Records, Higher Education
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Bodnar, Richard Carl – ProQuest LLC, 2021
Evidence suggests that adherence to information security policies is one of the best and most cost-effective ways to protect an organization. Much of the current research suggests that user behavior is often to blame for vulnerabilities being exploited. Employees that have a high level of information security awareness appear to perform well…
Descriptors: Information Security, Compliance (Legal), Higher Education, Measures (Individuals)
Annette Bamberger; Tien-Yin Huang – Journal of Education Policy, 2025
This paper analyses the EU's approach to international research cooperation between 2012-2022 drawing on critical geopolitical perspectives and the spatial politics of (re)bordering. It identifies two periods which represent the EU's shifting approaches to international research cooperation from the pursuit of a liberal agenda promoting…
Descriptors: Foreign Countries, Neoliberalism, International Cooperation, Research Administration
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Blackmon, Stephanie J. – Change: The Magazine of Higher Learning, 2023
Student privacy is a critical area of higher education that deserves greater focus, particularly as student data digitalization increases. Many colleges and universities use data literacy as a way to prepare students, sometimes from different disciplines, to work with others' data postgraduation. Data literacy can be an avenue for helping all…
Descriptors: Privacy, Data Collection, Data Use, Higher Education
Baig, Maria Ijaz; Yadegaridehkordi, Elaheh; Shuib, Liyana; Sallehuddin, Hasimi – Education and Information Technologies, 2023
Even though big data offers new opportunities to organizations, big data adoption (BDA) is still in the early stages of introduction, and its determinants remain unclear in many sectors. Therefore, this research intended to identify the determinants of BDA in the education sector. A theoretical model was developed based on the integration of the…
Descriptors: Foreign Countries, Learning Analytics, Higher Education, Structural Equation Models
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk