NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Zeinab Mohammed; Fatma Abdelgawad; Mamoun Ahram; Maha E. Ibrahim; Alya Elgamri; Ehsan Gamel; Latifa Adarmouch; Karima El Rhazi; Samar Abd ElHafeez; Henry Silverman – Research Ethics, 2024
Members of research ethics committees (RECs) face a number of ethical challenges when reviewing genomic research. These include issues regarding the content and type of consent, the return of individual research results, mechanisms of sharing specimens and health data, and appropriate community engagement efforts. This article presents the…
Descriptors: Research, Ethics, Committees, Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Liangqing Li – Education and Information Technologies, 2024
The purpose of the current article is to evaluate social responsibility, digital ethics, and knowledge about safe data storage among students of different ages. Four hundred students took part in the study: 200 people each in the first and fifth years of study. Their ages were 19.2 years (SD = 1.08) and 24.4 years (SD = 1.18), respectively. The…
Descriptors: Information Security, Social Responsibility, Ethics, Knowledge Level
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Labaran Isiaku; Ahmet Adalier – On the Horizon, 2025
Purpose: This study aims to investigate the challenges associated with the integration and implementation of blockchain technology in the education sector. The primary objective is to identify and categorize these challenges using the Technology-Organization-Environment (TOE) framework, shedding light on the technological, organizational and…
Descriptors: Literature Reviews, Technology Uses in Education, Information Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights