Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 7 |
Descriptor
Information Policy | 7 |
Information Technology | 7 |
Access to Information | 4 |
Information Security | 3 |
Privacy | 3 |
Barriers | 2 |
Compliance (Legal) | 2 |
Data | 2 |
Data Collection | 2 |
Federal Legislation | 2 |
Internet | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Center on Innovations in… | 1 |
Commercialism in Education… | 1 |
Education Commission of the… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Author
Agabi, Chinyere O. | 1 |
Agbor, Comfort Nkogho | 1 |
Baker, Ryan | 1 |
Boninger, Faith | 1 |
Haywood Gelman | 1 |
Irwin, Jim | 1 |
Lisa Mckee | 1 |
Major, Nanighe Baldwin | 1 |
Molnar, Alex | 1 |
Ololube, Nwachukwu Prince | 1 |
Sisneros, Lauren | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 3 |
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Colorado | 1 |
Nigeria | 1 |
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Sisneros, Lauren; Sponsler, Brian A. – Education Commission of the States, 2016
States and students are increasingly turning to online education programs to provide access to postsecondary education and support credential completion. Recent data indicate that more than 25 percent of postsecondary students take some portion of their coursework online, with 13 percent of students doing so exclusively. Additionally, an…
Descriptors: State Policy, Municipalities, Information Networks, Two Year Colleges
Baker, Ryan; Twyman, Janet S. – Center on Innovations in Learning, Temple University, 2016
This field report is the ninth in a series produced by the Center on Innovations in Learning's League of Innovators. The series describes, discusses, and analyzes policies and practices that enable personalization in education. This report introduces sessions from the "Conversations with Innovators" event held at Temple University, June…
Descriptors: Information Technology, Technology Uses in Education, Technology Integration, Educational Improvement
Ololube, Nwachukwu Prince; Agbor, Comfort Nkogho; Major, Nanighe Baldwin; Agabi, Chinyere O.; Wali, Worlu I. – International Journal of Education and Development using Information and Communication Technology, 2016
This research is a continuation of a theoretical review that evaluated ICT Policy Outcomes for National Development in relation to Networked Readiness Index (NRI) and the impact it has on knowledge integration and management in higher education institutions in Nigeria. A new dawn in information technology (IT) has initiated new trends in…
Descriptors: Information Technology, Global Approach, Knowledge Management, Higher Education
Irwin, Jim – ProQuest LLC, 2017
Literature suggested that the mandated filtering required by the Children's Internet Protection Act of 2000 adversely affected the educational system. The literature stated that schools imposed more restrictive filtering than the Act mandated. School systems had the responsibility to ensure that children learn to read, write, and perform…
Descriptors: Secondary School Students, Student Research, Internet, Online Searching
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection