Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 21 |
Since 2006 (last 20 years) | 29 |
Descriptor
Information Security | 29 |
Information Systems | 29 |
Privacy | 29 |
Data Collection | 11 |
Student Records | 10 |
Higher Education | 9 |
Computer Security | 8 |
Data Analysis | 7 |
Postsecondary Education | 7 |
College Students | 6 |
Confidentiality | 6 |
More ▼ |
Source
Author
Whitfield, Christina | 3 |
Armstrong, John | 2 |
Al-Azawei, Ahmed | 1 |
Alexander, Kay B. | 1 |
Ardalan, Alireza | 1 |
Ardalan, Roya K. | 1 |
Chinsook, Kittipong | 1 |
Clapper, Danial L. | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Ezeugo, Ernest | 1 |
More ▼ |
Publication Type
Journal Articles | 14 |
Reports - Descriptive | 13 |
Reports - Research | 9 |
Reports - Evaluative | 4 |
Dissertations/Theses -… | 3 |
Tests/Questionnaires | 3 |
Guides - Non-Classroom | 2 |
Numerical/Quantitative Data | 1 |
Education Level
Higher Education | 17 |
Postsecondary Education | 17 |
Elementary Secondary Education | 4 |
Early Childhood Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Policymakers | 2 |
Location
Arkansas | 2 |
California | 2 |
Florida | 2 |
Kentucky | 2 |
Tennessee (Nashville) | 2 |
United States | 2 |
Virginia | 2 |
Colorado | 1 |
Colorado (Denver) | 1 |
Georgia | 1 |
Illinois | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Pell Grant Program | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
ACT Assessment | 1 |
Florida Comprehensive… | 1 |
SAT (College Admission Test) | 1 |
What Works Clearinghouse Rating
Heinrich, Matthew; Gerhart, Natalie – Journal of Information Systems Education, 2023
Mobile devices are a constantly used item in a college student's life. Students depend on them for entertainment, academics, and socializing with their friends. While they continually use them, they perhaps do not understand the impact of their use on their privacy or that the devices can be used to track them and collect their personal…
Descriptors: Privacy, Handheld Devices, College Students, Student Attitudes
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Ezeugo, Ernest; Klein, Carrie; Whitfield, Christina – State Higher Education Executive Officers, 2021
State postsecondary data systems contain a wealth of information--including detailed records about individuals--that allow states to analyze and improve their postsecondary education systems. The entities that maintain these systems operate in a context of concern about the privacy and security of educational records. They have both an interest in…
Descriptors: Privacy, Information Security, Information Systems, Postsecondary Education
Chinsook, Kittipong; Khajonmote, Withamon; Klintawon, Sununta; Sakulthai, Chaiyan; Leamsakul, Wicha; Jantakoon, Thada – Higher Education Studies, 2022
Big data is an important part of innovation that has recently attracted a lot of interest from academics and practitioners alike. Given the importance of the education industry, there is a growing trend to investigate the role of big data in this field. Much research has been undertaken to date in order to better understand the use of big data in…
Descriptors: Student Behavior, Learning Analytics, Computer Software, Rating Scales
Isaac, James; Velez, Erin; Roberson, Amanda Janice – Institute for Higher Education Policy, 2023
Students, families, colleges, and lawmakers need clearer information on postsecondary outcomes to make informed decisions. By leveraging data available at institutions and federal agencies, a nationwide student-level data network (SLDN) would close information gaps that persist in our higher education landscape to answer critical questions about…
Descriptors: College Students, Data, Information Networks, Program Design
Grama, Joanna Lyn – Institute for Higher Education Policy, 2019
Our current federal postsecondary data system is incomplete and fails to provide today's students with the accurate, timely information that they need to inform their college choices and promote their success. As policymakers consider proposals to improve this federal data system, it is critical that they work in tandem to protect students'…
Descriptors: Privacy, Information Security, Postsecondary Education, Information Systems
National Forum on Education Statistics, 2020
The "Forum Guide to Data Governance" highlights how data governance programs benefit education agencies and provide timely and useful best practices, examples, and resources for agencies implementing or updating their data governance programs. This resource is intended to address the needs of federal, state, and local agencies related…
Descriptors: Data, Governance, Information Security, Privacy
Sayler, Andy – ProQuest LLC, 2016
The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…
Descriptors: Information Security, Trust (Psychology), Information Systems, Models
Ardalan, Alireza; Ardalan, Roya K.; Rao, Shailaja; Alexander, Kay B. – International Journal of Information and Learning Technology, 2019
Purpose: There has been a lack of an information systems architecture which explicitly illustrates processes that make and maintain the anonymity of student responses in an online system for student opinion survey of faculty teaching. The purpose of this paper is to present an information systems architecture which explicitly shows the process of…
Descriptors: Information Systems, Information Management, Privacy, Student Surveys
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Leventoff, Jenna – National Skills Coalition, 2019
This report urges states to participate in the State Wage Interchange System (SWIS), as it can aide states in satisfying Workforce Innovation and Opportunity Act (WIOA) reporting requirements, and help states better understand whether former participants in workforce training and education programs are finding good jobs. SWIS is a data sharing…
Descriptors: Federal Legislation, Labor Force Development, Salary Wage Differentials, Employment
Al-Azawei, Ahmed – Journal of Information Technology Education: Research, 2019
Aim/Purpose: This research investigates the success variables affecting the adoption of social networking sites (SNS), namely Facebook, and learning management systems (LMS), specifically Moodle, in developing countries. Background: In contemporary education, universities invest heavily in the integration of LMS with traditional classrooms.…
Descriptors: Social Networks, Social Media, Management Systems, Undergraduate Students
Data Quality Campaign, 2021
The 2020 election brought about legislative change across the country. New and veteran policymakers need information about the schools in their state. What programs are the most cost effective and work best for students? How can states attract and retain great teachers? What information do parents need to ensure that their kids are on track to…
Descriptors: Educational Policy, Policy Formation, Data Collection, Data Analysis
Previous Page | Next Page ยป
Pages: 1 | 2