Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 19 |
Since 2006 (last 20 years) | 27 |
Descriptor
Data Collection | 27 |
Information Security | 27 |
Information Technology | 27 |
Deception | 9 |
Distance Education | 9 |
Educational Legislation | 9 |
Elementary Secondary Education | 9 |
Federal Legislation | 9 |
Higher Education | 9 |
Accountability | 8 |
Administration | 8 |
More ▼ |
Source
Author
Andy Johnson | 1 |
Aurelia Raquel Rodriguez… | 1 |
Bohil, Corey J. | 1 |
Boninger, Faith | 1 |
Bradley, Sapora L. | 1 |
Brooks, Rochelle | 1 |
Fazlioglu, Muge | 1 |
Howard, Elizabeth V. | 1 |
Ilci, Ahmet | 1 |
Koh, Byungwan | 1 |
Lewis, Joanna E. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 11 |
Dissertations/Theses -… | 8 |
Journal Articles | 6 |
Reports - Evaluative | 3 |
Reports - Research | 3 |
Tests/Questionnaires | 2 |
Collected Works - Proceedings | 1 |
Guides - Non-Classroom | 1 |
Reports - General | 1 |
Education Level
Higher Education | 14 |
Postsecondary Education | 13 |
Elementary Secondary Education | 10 |
Audience
Researchers | 1 |
Location
New Jersey | 2 |
Ohio | 2 |
United States | 2 |
Australia | 1 |
Belgium | 1 |
Bermuda | 1 |
Canada | 1 |
Chile | 1 |
Czech Republic | 1 |
Denmark | 1 |
European Union | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Andy Johnson; Shawn Miller – Advanced Distributed Learning Initiative, 2023
The purpose of this document is to provide techniques to assist Department of Defense (DoD) acquisition personnel with the integration of learning technology standards into their Information Technology acquisition processes. This document supports Department of Defense Instruction (DoDI) 1322.26 and the updated DoDI 1322.26 references. This…
Descriptors: Government Employees, Lifelong Learning, Data Collection, Learning Activities
Patel, Pooja; Sarno, Dawn M.; Lewis, Joanna E.; Shoss, Mindy; Neider, Mark B.; Bohil, Corey J. – Applied Cognitive Psychology, 2019
Understanding how computer users allocate attention to features of potentially dangerous emails could help mitigate costly errors. Which features are salient? How stable is attention allocation across variation in email features? We attempted to measure the mental salience of several email features common in spam and/or phishing emails. We created…
Descriptors: Deception, Electronic Mail, Information Security, Data Collection
Rene David Chacon – ProQuest LLC, 2021
With the increasing data security awareness of mobile crowdsensing (MCS) participants, smartphone app developers are continually developing technical security protections, but with little consideration on human behaviors. Information technology (IT) advancements seen in the introduction of homomorphic encryption and privacy preserving…
Descriptors: Graduate Students, Student Participation, Handheld Devices, Computer Oriented Programs
van Baalen, Sebastian – Research Ethics, 2018
Information communications technologies (ICTs) like laptops, smartphones and portable storage devices facilitate travel, communication and documentation for researchers who conduct fieldwork. But despite increasing awareness about the ethical complications associated with using ICTs among journalists and humanitarians, there are few reflections on…
Descriptors: Information Technology, Internet, Ethics, Information Security
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Office of Inspector General, US Department of Education, 2023
In accordance with the Reports Consolidation Act of 2000, the OIG reports annually on the most serious management and performance challenges the Department faces. For FY 2024, we identified seven management challenges for the Department: (1) Implementing pandemic relief laws for elementary and secondary education; (2) Implementing pandemic relief…
Descriptors: Federal Programs, Educational Finance, Student Financial Aid, Pandemics
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Li, Weifeng – ProQuest LLC, 2017
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…
Descriptors: Social Media, Information Security, Role, Crime
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Office of Inspector General, US Department of Education, 2020
In accordance with the Reports Consolidation Act of 2000, the Office of Inspector General (OIG) reports annually on the most serious management and performance challenges the Department faces. OIG's reports include a brief assessment of the Department's progress in addressing the challenges. They also identify further actions that, if properly…
Descriptors: Federal Programs, Educational Finance, Information Security, Audits (Verification)
Office of Inspector General, US Department of Education, 2019
In accordance with the Reports Consolidation Act of 2000, the Office of Inspector General (OIG) reports annually on the most serious management and performance challenges the Department faces. OIG's reports include a brief assessment of the Department's progress in addressing the challenges. They also identify further actions that, if properly…
Descriptors: Federal Programs, Educational Finance, Information Security, Audits (Verification)
Bradley, Sapora L. – ProQuest LLC, 2017
The increasing implementation of technology applications into the workplace has substantiated the need for adept professionals who can manage HR technology for employees and provide data about the organization. For some companies, these professionals are found within the human resources department. These information systems professionals combine…
Descriptors: Human Resources, Professional Personnel, Information Systems, Qualitative Research
Office of Inspector General, US Department of Education, 2018
The Office of Inspector General (OIG) works to promote efficiency, effectiveness, and integrity in the programs and operations of the U.S. Department of Education (Department). Through OIG's audits, inspections, investigations, and other reviews, they continue to identify areas of concern within the Department's programs and operations and…
Descriptors: Federal Programs, Educational Finance, Information Security, Audits (Verification)
Previous Page | Next Page ยป
Pages: 1 | 2