Publication Date
In 2025 | 1 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 21 |
Since 2016 (last 10 years) | 39 |
Since 2006 (last 20 years) | 61 |
Descriptor
Information Security | 61 |
Information Technology | 61 |
Privacy | 61 |
Computer Security | 19 |
Internet | 13 |
Access to Information | 12 |
Foreign Countries | 12 |
Computer Software | 11 |
Federal Legislation | 11 |
Computer Mediated… | 10 |
Higher Education | 10 |
More ▼ |
Source
Author
Boninger, Faith | 2 |
Molnar, Alex | 2 |
AL Faresi, Ahmed | 1 |
Abdekhoda, Mohammadhiwa | 1 |
Alper Yayla | 1 |
Anderson, Jimmeka | 1 |
Andrew Doyle | 1 |
Asadi, Zoleixa | 1 |
Aurelia Raquel Rodriguez… | 1 |
Banik, Barnali Gupta | 1 |
Bartolacci, Mike | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 22 |
Postsecondary Education | 19 |
Elementary Secondary Education | 7 |
Secondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
Audience
Policymakers | 2 |
Practitioners | 1 |
Researchers | 1 |
Location
United States | 4 |
European Union | 2 |
India | 2 |
Arizona | 1 |
Arkansas | 1 |
Asia | 1 |
Brazil | 1 |
Canada | 1 |
China | 1 |
Estonia | 1 |
Europe | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 9 |
Health Insurance Portability… | 3 |
American Recovery and… | 1 |
Coronavirus Aid Relief and… | 1 |
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Renata Mekovec; Marija Kustelega – International Association for Development of the Information Society, 2024
The demand for privacy specialists is expected to increase, but there is a shortage of them to meet market demands. Certain ICT skills and competencies are required for professionals who develop, manage, and protect data that drive the digital world. The current study explores undergraduate students' attitude about different teaching strategies…
Descriptors: Undergraduate Students, Privacy, Specialists, Demand Occupations
Jenay Robert; Nicole Muscanell; Nichole Arbino; Mark McCormack; Jamie Reeves – EDUCAUSE, 2024
This report profiles the trends and key technologies and practices shaping the future of cybersecurity and privacy, and envisions a number of scenarios for that future. It is based on the perspectives and expertise of a global panel of leaders from across the higher education landscape. These are, in many ways, tumultuous times. Global political…
Descriptors: Information Security, Computer Security, Privacy, Higher Education
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Rene David Chacon – ProQuest LLC, 2021
With the increasing data security awareness of mobile crowdsensing (MCS) participants, smartphone app developers are continually developing technical security protections, but with little consideration on human behaviors. Information technology (IT) advancements seen in the introduction of homomorphic encryption and privacy preserving…
Descriptors: Graduate Students, Student Participation, Handheld Devices, Computer Oriented Programs
Sunita Dwivedi; Shinu Vig – Cogent Education, 2024
This study aims to understand the challenges in adoption of blockchain technology in higher education institutions in India using the technological-organizational-environmental (TOE) framework. Blockchain brings transparency, efficiency in working systems, and leveraging trust. The benefits of blockchain are multifaceted and might be beneficial to…
Descriptors: Foreign Countries, Information Technology, Educational Technology, Higher Education
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Tessa Consoli – Frontline Learning Research, 2024
Based on a national survey of 8,915 students, this study examines the prevalence of different types of media education practices in Swiss upper secondary schools and their relationship with students' online civic engagement and respectful online behavior. Descriptive statistics reveal that schools place little emphasis on media education and that…
Descriptors: Media Education, Teaching Methods, Differences, Citizen Participation
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2022
This Information Technology Specialist Resource List provides resources on understanding the role of information technology specialists in supporting school safety before, during, and after an emergency. Resources are organized into the following categories: (1) Cybersecurity and Cyber Safety Considerations for Schools and Districts; (2)…
Descriptors: Information Technology, Specialists, Role, School Safety