NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 1,477 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ali, Mazurina Mohd; Zaharon, Nur Farhana Mohd – International Journal of Educational Reform, 2024
Internet users are becoming ignorant with their data and the transparency of information due to the nature of high-speed internet today. Regrettably, internet users are deceived by engineering tactics performed by highly trained people, namely cybercriminals. Thus, in order to combat phishing attacks, internet users should be educated on security…
Descriptors: Information Security, Governance, Data, Literature Reviews
Kevin Dennis – ProQuest LLC, 2024
The first step to improving an organization's security posture is to define the organization's security goals. At a technical level, these goals are expressed as security policies. Security policies are predicates over programs, that return true or false if the program adheres to the policy. Defining these policies correctly is thus essential to…
Descriptors: Information Security, Computer Security, Policy, Integrity
Peer reviewed Peer reviewed
Direct linkDirect link
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Andres Felipe Zambrano; Shreya Singhal; Maciej Pankiewicz; Ryan Shaun Baker; Chelsea Porter; Xiner Liu – Information and Learning Sciences, 2025
Purpose: This study aims to evaluate the effectiveness of three large language models (LLMs), GPT-4o, Llama 3.3 70B and Llama 3.1 8B, in redacting personally identifying information (PII) from forum data in massive open online courses (MOOCs). Design/methodology/approach: Forum posts from students enrolled in nine MOOCs were redacted by three…
Descriptors: Artificial Intelligence, Identification, Privacy, Information Security
Erika Huffman – ACT Education Corp., 2025
Student data is an invaluable asset for driving educational success, yet it comes with significant responsibility. As states explore ways to enhance data privacy protections, they must strike a balance between safeguarding sensitive information and leveraging data for student success. This brief examines the best practices in student data privacy…
Descriptors: Data, Privacy, Best Practices, Testing
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Matthew S. Johnson – ETS Research Report Series, 2025
The rapid proliferation of artificial intelligence (AI) in educational measurement presents both transformative opportunities and complex ethical challenges. This paper articulates foundational principles for the responsible integration of AI in measurement and learning, drawing on established guidelines set forth by leading organizations such as…
Descriptors: Artificial Intelligence, Educational Assessment, Ethics, Sustainability
Peer reviewed Peer reviewed
Direct linkDirect link
Vishal Rana; Govand Khalid Azeez – Journal of Higher Education Policy and Management, 2025
The Australian Universities Accord Final Report offers a historic yet insufficient opportunity to advance Indigenous self-determination in higher education. Its goals will remain hollow without dismantling the entrenched colonial foundations embedded in universities' governance and data practices. This paper demands that Indigenous data…
Descriptors: Foreign Countries, Indigenous Populations, Self Determination, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Aimei Yang – Journalism and Mass Communication Educator, 2025
At the forefront of industries profoundly influenced by artificial intelligence (AI), public relations (PRs) are undergoing a transformative revolution. The increasing applications of AI in PRs are driving a demand for proficient practitioners. Recognizing this, PR educational institutions must adapt by delivering tailored AI education. Despite…
Descriptors: Artificial Intelligence, Public Relations, Programming, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Aysun Günes; Aysegül Liman Kaban – Higher Education Quarterly, 2025
The rapid integration of artificial intelligence (AI) into higher education has revolutionised academic research and teaching, offered transformative opportunities while raising significant ethical challenges. This Delphi study investigates the ethical dilemmas and institutional requirements for maintaining academic integrity in AI-driven…
Descriptors: Artificial Intelligence, Ethics, Integrity, Higher Education
Leon Katcharian – ProQuest LLC, 2023
Remotely proctored online examinations proliferate in academic and corporate learning environments (Grajek, 2020). Remote (virtual) proctoring allows organizations to efficiently offer tests globally while reducing the costs of proctored testing generally associated with traditional paper-and-pencil and computer-based testing center examinations.…
Descriptors: Computer Assisted Testing, Supervision, Distance Education, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Elif Ozturk – Journal of Education in Science, Environment and Health, 2025
This study examines the pedagogical, ethical, and political dimensions of artificial intelligence (AI) in early childhood STEM education from a theoretical perspective. As digital technologies become increasingly prevalent in education, AI applications offer significant opportunities in areas such as personalized learning experiences, game-based…
Descriptors: Early Childhood Education, STEM Education, Artificial Intelligence, Game Based Learning
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  99