NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Defining Issues Test1
What Works Clearinghouse Rating
Showing 1 to 15 of 256 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Mengjiao Zhang – ProQuest LLC, 2024
The rise of Artificial Intelligence technology has raised concerns about the potential compromise of privacy due to the handling of personal data. Private AI prevents cybercrimes and falsehoods and protects human freedom and trust. While Federated Learning offers a solution by model training across decentralized devices or servers, thereby…
Descriptors: Privacy, Cooperative Learning, Natural Language Processing, Learning Processes
Peer reviewed Peer reviewed
Direct linkDirect link
Janine Arantes – Learning, Media and Technology, 2024
As a result of the growing commercial marketplace for teachers' digital data, a new organization that includes educational data brokers has evolved. Educational data brokerage is relatively intangible due to the ease of de-identified data being collected and sold via educational technology. There is an urgent need to expose how the brokerage of…
Descriptors: Data Collection, Educational Technology, Commercialization, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Biedermann, Daniel; Ciordas-Hertel, George-Petru; Winter, Marc; Mordel, Julia; Drachsler, Hendrik – Journal of Learning Analytics, 2023
Learners use digital media during learning for a variety of reasons. Sometimes media use can be considered "on-task," e.g., to perform research or to collaborate with peers. In other cases, media use is "off-task," meaning that learners use content unrelated to their current learning task. Given the well-known problems with…
Descriptors: Learning Processes, Learning Analytics, Information Technology, Behavior Patterns
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Elma Hajric – ProQuest LLC, 2024
Smart cities surveil through ubiquitous and intrusive data collection via networked sensors. Smart city efforts are also frequently imagined as primarily top-down and male visions of the future in service of economic benefit. The smart campus presents a new dimension of smart city urbanism as an identified gap in literature. In the following…
Descriptors: Research Universities, Campuses, Information Technology, Design
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ridvan Kagan Agca; Özgen Korkmaz – International Journal of Technology in Education, 2025
The aim of this study was to determine the effect of training on the integration of artificial intelligence into education given to pre-service teachers on their concerns about artificial intelligence and their views on the integration of artificial intelligence into education. In this study, sequential explanatory design, one of the mixed…
Descriptors: Artificial Intelligence, Anxiety, Influence of Technology, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Renata Mekovec; Marija Kustelega – International Association for Development of the Information Society, 2024
The demand for privacy specialists is expected to increase, but there is a shortage of them to meet market demands. Certain ICT skills and competencies are required for professionals who develop, manage, and protect data that drive the digital world. The current study explores undergraduate students' attitude about different teaching strategies…
Descriptors: Undergraduate Students, Privacy, Specialists, Demand Occupations
Jenay Robert; Nicole Muscanell; Nichole Arbino; Mark McCormack; Jamie Reeves – EDUCAUSE, 2024
This report profiles the trends and key technologies and practices shaping the future of cybersecurity and privacy, and envisions a number of scenarios for that future. It is based on the perspectives and expertise of a global panel of leaders from across the higher education landscape. These are, in many ways, tumultuous times. Global political…
Descriptors: Information Security, Computer Security, Privacy, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Eun Ok Baek; Romina Villaflor Wilson – International Journal of Adult Education and Technology, 2024
The emergence of generative AI technologies has provoked considerable debate among educators regarding their role in education. This study is an investigation of the benefits, disadvantages, and potential strategies for integrating generative AI in educational settings by analyzing societal impacts based on a literature review. We have surveyed…
Descriptors: Artificial Intelligence, Technology Uses in Education, Information Technology, Educational Strategies
Nichols, T. Philip; Monea, Alexander – Phi Delta Kappan, 2023
T. Philip Nichols and Alexander Monea explore the spread of data-driven surveillance (i.e., dataveillance) technologies in schools, which are increasingly used as a strategy for mitigating safety risks. They argue that the sense of security schools derive from these technologies often comes at the cost of students' actual well-being and privacy.…
Descriptors: Student Records, School Safety, Risk Management, Well Being
Peer reviewed Peer reviewed
Direct linkDirect link
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  18