Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 25 |
Descriptor
Computer Software | 35 |
Internet | 35 |
Privacy | 35 |
Computer Security | 14 |
Information Technology | 14 |
Higher Education | 10 |
Information Security | 10 |
Computers | 9 |
Web Sites | 9 |
Access to Information | 8 |
Foreign Countries | 8 |
More ▼ |
Source
Author
Alexander, Bryan | 1 |
Almeroth, Kevin | 1 |
Beadnell, Stephen Allen | 1 |
Bennett, Cedric | 1 |
Boon, Stuart | 1 |
Borcea-Pfitzmann, Katrin | 1 |
Brandt, D. Scott | 1 |
Briggs, Linda L. | 1 |
Bristow, Rob | 1 |
Buckman, Joel | 1 |
Capo, Berta | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 15 |
Postsecondary Education | 8 |
Elementary Secondary Education | 5 |
Adult Education | 1 |
Elementary Education | 1 |
Secondary Education | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Policymakers | 1 |
Teachers | 1 |
Location
United Kingdom | 3 |
Australia | 2 |
Brazil | 2 |
Canada | 2 |
Germany | 2 |
Japan | 2 |
Netherlands | 2 |
Singapore | 2 |
Spain | 2 |
United States | 2 |
Asia | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Digital Millennium Copyright… | 1 |
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Elgharnah, Khairi Ghet Elghadafi; Ozdamli, Fezile – World Journal on Educational Technology: Current Issues, 2020
Internet security safety awareness of parents is an important issue that should be addressed to raise the knowledge and awareness level about internet risks, information privacy, personal information, safety concerns and online attacks among parents to be able to teach their children to keep safe use on the internet. This study amid to investigate…
Descriptors: Internet, Safety, Parents, Knowledge Level
Labrecque, Lauren I.; Markos, Ereni; Darmody, Aron – Journal of Marketing Education, 2021
Sophisticated technology advances are delivering new and powerful ways for marketers to collect and use consumer data. These data-driven marketing capabilities present a unique challenge for students, as they will soon be expected to manage consumer data and make business decisions based on ethical, legal, and fiscal considerations. This article…
Descriptors: Marketing, Advertising, Privacy, Comparative Analysis
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Lee, Nicole M. – Communication Education, 2018
The Internet poses a variety of risks at both the individual and societal levels including scams and the spread of misinformation. Older adults are especially vulnerable to many of these risks. This paper argues that one important strategy for combating such threats is through digital media literacy education. Although a good deal of research on…
Descriptors: Deception, Computer Mediated Communication, Internet, Misconceptions
Sauers, Nicholas J.; Richardson, Jayson W. – Journal of Research on Technology in Education, 2019
School leaders around the world navigate a learning environment where most students have (or soon will have) ubiquitous access to an Internet-connected device. As a result, districts have implemented acceptable use policies (AUPs) to address the ways that students are using those technologies. In this study, we analyzed the AUPs of 75 one-to-one…
Descriptors: Computer Use, Policy Formation, Student Empowerment, Board of Education Policy
Beadnell, Stephen Allen – ProQuest LLC, 2014
The banking industry is being challenged by shareholders and consumers to provide its products in the most efficient manner, provide good customer service, and earn a fair profit. Although the infrastructure is in place to serve most customers through Internet banking, the number of customers using this channel is less than expected. The purpose…
Descriptors: Case Studies, Banking, Computer Software, Internet
Privacy Technical Assistance Center, 2014
Today's classrooms increasingly employ on-demand delivery of personalized content, virtual forums for interacting with other students and teachers, and a wealth of other interactive technologies that help foster and enhance the learning process. Online forums help teachers share lesson plans; social media help students collaborate across…
Descriptors: Privacy, Information Security, Online Systems, Internet
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Lorenz, Anja; Borcea-Pfitzmann, Katrin – Interactive Technology and Smart Education, 2010
Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…
Descriptors: Cooperation, Interaction, Data, Role
Chow, Chi Yin – ProQuest LLC, 2010
Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…
Descriptors: Reaction Time, Privacy, Geographic Information Systems, Geographic Location
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection