NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive15
Journal Articles6
Speeches/Meeting Papers2
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Jeremy Roschelle; Judi Fusco; Pati Ruiz – Digital Promise, 2024
As Artificial Intelligence within education becomes increasingly important, Digital Promise reviewed the guidance documents released by seven states--California, North Carolina, Ohio, Oregon, Virginia, Washington state, and West Virginia--on how to approach artificial intelligence (AI) in education. Throughout this report the authors summarize the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Employment Qualifications, Responsibility
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Lin, Van-Kim; Crowne, Sarah – Early Childhood Data Collaborative, 2020
Home visiting programs typically collect sensitive information about family characteristics, risk factors, and services received. States may choose to integrate these data with other early childhood data to learn more about the reach and effectiveness of the services and supports that families receive. As more states begin to integrate data across…
Descriptors: Home Visits, Privacy, Information Security, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wojniak, Justyna; Majorek, Marta – Universal Journal of Educational Research, 2016
The paper concerns the opportunities of use information and communication technologies for the education purposes. It presents key assumptions of the European Union policy concerning innovative methods of training and the prospects for their further development. As nowadays one can observe increasing activity of the children and young people in…
Descriptors: Internet, Information Security, Child Safety, Risk
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Boninger, Faith; Molnar, Alex – National Education Policy Center, 2020
The COVID-19 pandemic has given the entire country a crash course in virtual education and digital education platforms. School leaders have been forced to consider a set of very imperfect options as they struggle to reopen their schools. This three-brief collection identifies key issues for school leaders to consider before adopting a digital…
Descriptors: Educational Technology, Technology Uses in Education, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Grama, Joanna Lyn; Petersen, Rodney – EDUCAUSE Review, 2013
Governance, risk, and compliance (GRC) issues are increasingly pervading the IT space, with these concepts transcending silos such as central and distributed IT units, information security, and service management. As campus investment in information technology and campus reliance on information systems have grown, so has the need for reliable…
Descriptors: Governance, Risk, Compliance (Legal), Information Technology
Moradi Sheykhjan, Tohid – Online Submission, 2017
Our goal for this paper discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in relation to its application for educating digital citizens. In recent years we have witnessed a revolution in Information and Communication Technologies (ICTs) that has transformed every field of…
Descriptors: Internet, Online Searching, Educational Research, Social Science Research
Center for IDEA Early Childhood Data Systems (DaSy), 2014
This 2014 document is an adaptation of the 2012 release of "Frequently Asked Questions--Disclosure Avoidance" intended for K-12 audiences. Presented here in the form of responses to frequently asked questions (FAQs) are suggestions intended to provide guidance to IDEA Part C early intervention and Part B 619 preschool special education…
Descriptors: Disabilities, Educational Legislation, Federal Legislation, Equal Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing
Alberta Education, 2013
Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…
Descriptors: Internet, Educational Technology, Computer Uses in Education, Shared Resources and Services
Peer reviewed Peer reviewed
Direct linkDirect link
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Wills, Lisa M. – New England Journal of Higher Education, 2011
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
Descriptors: Higher Education, Risk Management, Risk, Access to Information
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
US Department of Homeland Security, 2010
Critical infrastructure and key resources (CIKR) provide the essential services that support basic elements of American society. Compromise of these CIKR could disrupt key government and industry activities, facilities, and systems, producing cascading effects throughout the Nation's economy and society and profoundly affecting the national…
Descriptors: Higher Education, Research and Development, National Security, Information Management