Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 10 |
Since 2016 (last 10 years) | 28 |
Since 2006 (last 20 years) | 66 |
Descriptor
Source
Author
Boninger, Faith | 2 |
Molnar, Alex | 2 |
Zimmerle, Joanna C. | 2 |
AL Faresi, Ahmed | 1 |
Abdolahifard, Khadije | 1 |
Achinewhu-Nworgu, Elizabeth | 1 |
Alawneh, John | 1 |
Alier, Marc | 1 |
Altun, Halis | 1 |
Andrew Hope | 1 |
Ayyagari, Ramakrishna | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 23 |
Postsecondary Education | 17 |
Elementary Secondary Education | 16 |
Adult Education | 2 |
Early Childhood Education | 2 |
Elementary Education | 1 |
Audience
Policymakers | 4 |
Media Staff | 2 |
Parents | 1 |
Teachers | 1 |
Location
United States | 4 |
Texas | 2 |
United Kingdom | 2 |
Australia | 1 |
California | 1 |
Canada | 1 |
Colorado | 1 |
Connecticut | 1 |
Croatia | 1 |
Florida | 1 |
Illinois | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 8 |
American Recovery and… | 2 |
Elementary and Secondary… | 1 |
Every Student Succeeds Act… | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Foundation for Excellence in Education (ExcelinEd), 2017
The effective use of student data is essential for improving student outcomes and equipping educators with the information they need to help every student remain on a path to educational success. Student data can help teachers personalize and customize instruction, equip parents and students with information to make informed educational choices,…
Descriptors: Student Records, Privacy, Information Security, Information Utilization
Data Quality Campaign, 2017
Over the past decade, states have made enormous progress in collecting, using, and reporting education data in service of learning--although state legislation has primarily focused on implementing the robust privacy and security protections and data governance structures that make data use safe. In the 2017 legislative session, data privacy…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Data Quality Campaign, 2018
2018 is the fifth year that state policymakers have taken concerted legislative action on education data use and privacy issues. Across the country this year, 42 states considered 300 bills and 25 states passed 59 new laws governing the collection, linking, use, access, and protection of education data. With the passage of the Every Student…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Data Quality Campaign, 2016
Student data privacy was a priority issue in state legislatures in 2016, though as expected, states passed fewer student data privacy bills into law than they did in 2014 and 2015. The privacy conversation has evolved since 2014, and now states have the ability to borrow from each other: California's 2014 Student Online Personal Information…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
South Dakota Department of Education, 2015
The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…
Descriptors: Information Policy, Data, Access to Information, Confidentiality
Waddell, Stanie Adolphus – ProQuest LLC, 2013
Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…
Descriptors: Information Security, Higher Education, Information Policy, Statistical Analysis
Ayyagari, Ramakrishna; Figueroa, Norilyz – Journal of Information Systems Education, 2017
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
Descriptors: Information Security, Evidence, Information Science Education, Information Policy
Carlon, Sarah; Carter, Mark; Stephenson, Jennifer – Australasian Journal of Special Education, 2017
A pilot study of the effectiveness of guided access to websites that provide information on intervention options for children with autism spectrum disorder (ASD) was conducted with 12 parents of preschool aged children with ASD. Guided access to reliable websites that included information about the effcacy of interventions for ASD (Raising…
Descriptors: Pilot Projects, Web Sites, Early Intervention, Decision Making
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Grama, Joanna – EDUCAUSE, 2014
This "Just in Time" research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this…
Descriptors: Higher Education, Information Policy, Information Security, Privacy
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Trump, Kenneth S. – Educational Leadership, 2015
Kenneth Trump, a school safety expert who consults with districts on how to respond to school safety crises, explains how the new prevalence of threats of violence being delivered over digital and social media creates for administrators a "communication crisis" that unfolds alongside the real or perceived crisis of school safety being…
Descriptors: School Safety, Risk Assessment, Emergency Programs, Information Security
Data Quality Campaign, 2014
High education expectations--and the tools to ensure that they are being met--empower educators, students, parents, and policymakers to support student learning and make the best decisions to improve education. Most states have voluntarily adopted the Common Core State Standards to serve as their education expectations. To consistently and…
Descriptors: State Standards, Consortia, Organizational Theories, Data Collection
Data Quality Campaign, 2014
Growing state and district use of education data and increased public attention to the ways in which these data are collected, used, managed, and disclosed have sparked conversation on the value of data and how they are protected. Student data (e.g., demographics, transcripts, attendance, test scores, outcomes, etc.) are an important tool for…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy