NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 145 results Save | Export
Michael J. Becker – ProQuest LLC, 2024
Effective management of digital identities and personal data is essential in modern society. Personal information management systems (PIMS) empower people to control their digital identities and personal data. Using the reasoned action approach (RAA) developed by Fishbein and Ajzen (2010), I derived the RAA-Trust Model for PIMS Adoption and…
Descriptors: Information Management, Information Security, Data, Adults
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Labaran Isiaku; Ahmet Adalier – On the Horizon, 2025
Purpose: This study aims to investigate the challenges associated with the integration and implementation of blockchain technology in the education sector. The primary objective is to identify and categorize these challenges using the Technology-Organization-Environment (TOE) framework, shedding light on the technological, organizational and…
Descriptors: Literature Reviews, Technology Uses in Education, Information Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Badie, Nasrin; Hussin, Ab Razak Che; Yadegaridehkordi, Elaheh; Singh, Dalbir; Lashkari, Arash Habibi – Education and Information Technologies, 2023
Cloud computing is the next generation of on-demand information technology services and products that deliver various applications over the Internet. Cloud computing is often adopted as a superior alternative by data centers to replace their current system. However, cloud computing services are still accompanied by many issues which hinder their…
Descriptors: Foreign Countries, Universities, Information Management, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rory McGreal – International Journal of E-Learning & Distance Education, 2023
Micro-credentials can provide easily accessible and transparent evidence of skills or knowledge that have been certified by an authority, based on small units of learning. The recognition and transfer of credits is becoming essential, as an increasing number of students are studying at different institutions, often at the same time, online or in…
Descriptors: Microcredentials, Information Storage, Databases, Technology Uses in Education
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Bacak, Julie; Wagner, Jonathan; Martin, Florence; Byker, Erik; Wang, WeiChao; Alhgrim-Delzell, Lynn – Journal of Educational Technology Systems, 2023
K-12 schools utilize a growing number of technologies to operate effectively, ranging from technologies for learning to technologies that manage student and personnel data. We share findings from an analysis of 23 school district websites for technologies used in a number of K-12 school districts surrounding a public, research university in a…
Descriptors: Elementary Secondary Education, School Districts, Educational Technology, Classification
Jeremy Roschelle; Amanda Wortman; Stefani Pautz Stephenson – Digital Promise, 2025
Digital learning platforms (DLPs) can transform educational research by serving as infrastructure that bridges the gap between practice and research. This white paper examines the progress of DLPs in SEERNet, a multi-year initiative funded by the Institute of Education Sciences (IES), which aims to advance research infrastructure. Through…
Descriptors: Electronic Learning, Educational Research, Influence of Technology, Research
Peer reviewed Peer reviewed
Direct linkDirect link
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Chander, Romesh; Dhar, Meghna; Bhatt, Ketan – Journal of Access Services, 2022
With the rising cases of theft, vandalism, mutilation, infiltration, and other fraudulent practices at academic libraries, the matter of library security has become a matter of greater concern for modern-day library professionals as well as scholars in the field of library and information science. Considering the seriousness of the issue, the…
Descriptors: Bibliometrics, Academic Libraries, Information Security, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Saroja Kumar Panda; Atul Bhatt; Aparna Satapathy – New Review of Academic Librarianship, 2024
The paper aims to discuss ChatGPT and its role in academic libraries. It identifies the key areas where ChatGPT can be implemented in libraries to improve various services and the overall work experience of academics, along with the risk factors associated with ChatGPT. Research finds that ChatGPT can be aided with many library services such as…
Descriptors: Artificial Intelligence, Technology Uses in Education, Academic Libraries, Library Services
Peer reviewed Peer reviewed
Direct linkDirect link
Hsu, Ching-Sheng; Tu, Shu-Fen; Chiu, Pei-Chia – Education and Information Technologies, 2022
Paper certificates are difficult to carry, easy to lose, easy to forge and with other security issues, which were not solved until the emergence of blockchain technology. Blockchain technology uses one-way hash functions, asymmetric encryption, digital signatures, consensus mechanisms and smart contracts to achieve decentralization, non-tampering…
Descriptors: Educational Certificates, Electronic Publishing, Human Body, Recognition (Psychology)
Peer reviewed Peer reviewed
Direct linkDirect link
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10