Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Data Collection | 9 |
Information Security | 9 |
Risk | 9 |
Privacy | 6 |
Data Use | 4 |
Computer Security | 3 |
Access to Information | 2 |
Civil Rights | 2 |
Data Analysis | 2 |
Disclosure | 2 |
Educational Needs | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
ETS Research Report Series | 1 |
Early Childhood Data… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Marketing Education | 1 |
The White House | 1 |
US Government Accountability… | 1 |
Author
Crowne, Sarah | 1 |
David B. Warner | 1 |
Fazlioglu, Muge | 1 |
Freund, David | 1 |
Ilci, Ahmet | 1 |
Lin, Mei-jang | 1 |
Lin, Van-Kim | 1 |
Lisa McKee | 1 |
Moran, Nora | 1 |
Nilsen, Richard K. | 1 |
Nowicki, Jacqueline M. | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 3 |
Reports - Research | 3 |
Guides - General | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Audience
Policymakers | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Health Insurance Portability… | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
National Assessment of… | 1 |
What Works Clearinghouse Rating
David B. Warner; Lisa McKee – Journal of Cybersecurity Education, Research and Practice, 2024
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity…
Descriptors: Information Security, Privacy, Governance, Compliance (Legal)
The White House, 2022
Among the great challenges posed to democracy today is the use of technology, data, and automated systems in ways that threaten the rights of the American public. Too often, these tools are used to limit our opportunities and prevent our access to critical resources or services. These problems are well documented. In America and around the world,…
Descriptors: Artificial Intelligence, Algorithms, Privacy, Information Security
Nowicki, Jacqueline M. – US Government Accountability Office, 2020
A cybersecurity incident is an event that actually or potentially jeopardizes a system or the information it holds. When a student's personal information is disclosed, it can lead to physical, emotional, and financial harm. Organizations are vulnerable to data security risks, including over 17,000 public school districts and approximately 98,000…
Descriptors: Information Security, Computer Security, Student Records, Elementary Secondary Education
Lin, Van-Kim; Crowne, Sarah – Early Childhood Data Collaborative, 2020
Home visiting programs typically collect sensitive information about family characteristics, risk factors, and services received. States may choose to integrate these data with other early childhood data to learn more about the reach and effectiveness of the services and supports that families receive. As more states begin to integrate data across…
Descriptors: Home Visits, Privacy, Information Security, Data Collection
Walker, Kristen L.; Moran, Nora – Journal of Marketing Education, 2019
The marketing field is undergoing dramatic shifts in the digital age. The increasing reliance on, collection, and use of data enabled by technological innovations requires teaching the responsible use of data for personalization, and marketing educators play a critical role. Students, universities, accrediting agencies, and employers demand…
Descriptors: Data Use, Social Responsibility, Consumer Economics, Business Administration Education
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Oranje, Andreas; Freund, David; Lin, Mei-jang; Tang, Yuxin – ETS Research Report Series, 2007
In this paper, a data perturbation method for minimizing the possibility of disclosure of participants' identities on a survey is described in the context of the National Assessment of Educational Progress (NAEP). The method distinguishes itself from most approaches because of the presence of cognitive tasks. Hence, a data edit should have minimal…
Descriptors: Student Surveys, Risk, National Competency Tests, Data Analysis