Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Data | 7 |
Information Policy | 7 |
Information Technology | 7 |
Privacy | 4 |
Data Collection | 3 |
Information Management | 3 |
Laws | 3 |
Student Records | 3 |
Access to Information | 2 |
Compliance (Legal) | 2 |
Computer Networks | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Center on Innovations in… | 1 |
EDUCAUSE Quarterly | 1 |
Journal of Cybersecurity… | 1 |
Library Hi Tech | 1 |
National Education Policy… | 1 |
Author
Baker, Ryan | 1 |
Boninger, Faith | 1 |
Fore, Julie A. | 1 |
Haywood Gelman | 1 |
Lisa Mckee | 1 |
Molnar, Alex | 1 |
Nixon, Andrea | 1 |
Suvineetha Herath | 1 |
Tirgari, Vesal | 1 |
Twyman, Janet S. | 1 |
Wu, Yuehua | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Baker, Ryan; Twyman, Janet S. – Center on Innovations in Learning, Temple University, 2016
This field report is the ninth in a series produced by the Center on Innovations in Learning's League of Innovators. The series describes, discusses, and analyzes policies and practices that enable personalization in education. This report introduces sessions from the "Conversations with Innovators" event held at Temple University, June…
Descriptors: Information Technology, Technology Uses in Education, Technology Integration, Educational Improvement
Molnar, Alex; Boninger, Faith – National Education Policy Center, 2015
Computer technology has made it possible to aggregate, collate, analyze, and store massive amounts of information about students. School districts and private companies that sell their services to the education market now regularly collect such information, raising significant issues about the privacy rights of students. Most school districts lack…
Descriptors: Privacy, Information Security, Data, Student Records
Tirgari, Vesal – ProQuest LLC, 2010
The phenomenological study explored the lived experiences and perceptions of a purposive sample of 20 IT professionals (managers, engineers, administrators, and analysts) in the state of Virginia, Texas, and Washington DC. The focus of this research study was to learn the perceptions of IT professionals who are or once were in a decision-making…
Descriptors: Information Technology, Professional Personnel, Attitudes, Phenomenology
Wu, Yuehua – ProQuest LLC, 2010
The development and diffusion of information and communication technologies, particularly the internet, creates a worldwide trend of using ICTs and the internet to deliver public services. This new form of electronic administration--e-government--potentially offers great benefits to society in that it can enhance public service efficiency,…
Descriptors: Foreign Countries, Governance, Information Dissemination, Telecommunications

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers