Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Confidentiality | 3 |
Information Security | 3 |
Information Storage | 3 |
Information Technology | 3 |
Data Collection | 2 |
Information Management | 2 |
Best Practices | 1 |
Computer Security | 1 |
Data | 1 |
Educational Legislation | 1 |
Ethics | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Education Level
Audience
Location
New Jersey | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
van Baalen, Sebastian – Research Ethics, 2018
Information communications technologies (ICTs) like laptops, smartphones and portable storage devices facilitate travel, communication and documentation for researchers who conduct fieldwork. But despite increasing awareness about the ethical complications associated with using ICTs among journalists and humanitarians, there are few reflections on…
Descriptors: Information Technology, Internet, Ethics, Information Security
Privacy Technical Assistance Center, 2014
Educational agencies and institutions increasingly collect and maintain large amounts of data about students in order to provide educational services. Some data, like students' transcript information, may need to be preserved indefinitely. Other student information will need to be preserved for a prescribed period of time to comply with legal or…
Descriptors: Best Practices, Information Management, Information Security, Data