Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 10 |
Since 2016 (last 10 years) | 28 |
Since 2006 (last 20 years) | 66 |
Descriptor
Source
Author
Boninger, Faith | 2 |
Molnar, Alex | 2 |
Zimmerle, Joanna C. | 2 |
AL Faresi, Ahmed | 1 |
Abdolahifard, Khadije | 1 |
Achinewhu-Nworgu, Elizabeth | 1 |
Alawneh, John | 1 |
Alier, Marc | 1 |
Altun, Halis | 1 |
Andrew Hope | 1 |
Ayyagari, Ramakrishna | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 23 |
Postsecondary Education | 17 |
Elementary Secondary Education | 16 |
Adult Education | 2 |
Early Childhood Education | 2 |
Elementary Education | 1 |
Audience
Policymakers | 4 |
Media Staff | 2 |
Parents | 1 |
Teachers | 1 |
Location
United States | 4 |
Texas | 2 |
United Kingdom | 2 |
Australia | 1 |
California | 1 |
Canada | 1 |
Colorado | 1 |
Connecticut | 1 |
Croatia | 1 |
Florida | 1 |
Illinois | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 8 |
American Recovery and… | 2 |
Elementary and Secondary… | 1 |
Every Student Succeeds Act… | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Data Quality Campaign, 2014
The Data Quality Campaign (DQC) is dedicated to helping everyone with a stake in education, including parents, teachers, education leaders, and policymakers, effectively and appropriately understand and use education data. DQC helps parents and educators understand the value of data--why data matter and how they can help students be successful in…
Descriptors: State Surveys, Annual Reports, State Action, Data
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Data Quality Campaign, 2016
Every state can create secure, robust linkages between early childhood and K-12 data systems, and effectively use the information from these linkages to implement initiatives to support programs and children, answer key policy questions, and be transparent about how the state's early childhood investments prepare students for success in school and…
Descriptors: Early Childhood Education, Elementary School Curriculum, Data, Program Implementation
Gentile, Mark – Education Digest: Essential Readings Condensed for Quick Review, 2012
Today, corporate users are not the only ones rapidly embracing mobile tablets for daily use--this transition has spilled over into the education sector. Schools have begun incorporating mobile devices such as iPads and other tablets into their curriculum. While this trend brings new and exciting educational opportunities, administrators and…
Descriptors: Handheld Devices, Classroom Environment, Classroom Techniques, Technology Integration
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Veltsos, Jennifer R. – Business Communication Quarterly, 2012
Forty-six states require organizations to notify users when personally identifiable information has been exposed or when the organization's data security measures have been breached. This article describes a qualitative document analysis of 13 data breach notification templates from state and federal agencies. The results confirm much of the…
Descriptors: Information Security, Compliance (Legal), Disclosure, Models
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Bess, Donald Arlo – ProQuest LLC, 2012
Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…
Descriptors: Information Security, Organizational Culture, Case Studies, Information Management
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis
Pierce, Margo – T.H.E. Journal, 2012
"If one life is saved, then it's worth it." That is the cliched argument frequently used to justify banning electronic communications, websites, and other forms of technology in schools. The common belief is that these prohibitions will prevent, among other things, the sexual assault of minors or suicides related to cyberbullying. But that…
Descriptors: Internet, Child Safety, Safety Education, Information Policy
Devgan, Vipan – ProQuest LLC, 2012
Many organizations recognize employees as great assets in the efforts to reduce risk related to information security. Employee's compliance with information security rules and regulations of organization is the key to strengthening information security. It is crucial for organizations to understand factors affecting technology compliance to…
Descriptors: Self Efficacy, Compliance (Legal), Information Security, Information Policy
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology