Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 10 |
Since 2016 (last 10 years) | 28 |
Since 2006 (last 20 years) | 75 |
Descriptor
Source
Author
Publication Type
Education Level
Higher Education | 25 |
Elementary Secondary Education | 21 |
Postsecondary Education | 14 |
Adult Education | 2 |
Secondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Location
United States | 7 |
Canada | 5 |
United Kingdom | 5 |
California | 4 |
China | 2 |
Connecticut | 2 |
Pennsylvania | 2 |
Texas | 2 |
Virginia | 2 |
Colorado | 1 |
Colorado (Aurora) | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Data Quality Campaign, 2011
Over the last five years, states have made significant progress implementing statewide longitudinal data systems (SLDS) to collect, store, link and share student-level data. States and the many national organizations supporting their efforts recognized that while building and using these indispensable data systems are important for policy,…
Descriptors: Student Records, Privacy, Information Policy, Confidentiality
Data Quality Campaign, 2014
Education data can empower educators, students, parents, and policymakers with the information they need to make the best decisions to improve student achievement, information that can move the nation toward an education system in which every student graduates prepared for college and career. Safeguarding the privacy of student data is a critical…
Descriptors: Data, Misconceptions, Privacy, Student Records
Rowe, John – Journal of Higher Education Policy and Management, 2014
The phenomenal growth in the use of social media in the past 10 years has dramatically and irreversibly changed the way individuals communicate and interact with one another. While there are undoubtedly many positives arising out of the use of social media, irresponsible or inappropriate use can have significant negative consequences. In the…
Descriptors: College Students, Social Networks, Mass Media Use, Information Policy
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis
Girvan, C.; Savage, T. – Interactive Learning Environments, 2012
The combination of features in virtual worlds provides an opportunity to implement and research unique learning experiences. With increasing interest and activity from the educational research community, exploring virtual worlds for teaching and learning, there is a need to identify and understand the ethical implications of conducting research in…
Descriptors: Educational Research, Ethics, Virtual Classrooms, Learning Experience
Nathan, Lisa P.; MacGougan, Alice; Shaffer, Elizabeth – Journal of Education for Library and Information Science, 2014
Social networking tools offer opportunities for innovative, participative pedagogical practice within traditional institutional frameworks. However, tensions continue to develop within this space: between creativity and security, personal and professional identity, privacy and openness. We argue that iSchools are uniquely positioned to create…
Descriptors: Social Networks, School Policy, Educational Technology, Online Courses
Taylor, Emmeline – Journal of Education Policy, 2011
The use of CCTV in schools is now commonplace in the UK. It is estimated that 85% of all UK secondary schools currently have CCTV systems in operation. The introduction of the Data Protection Act 1998 (DPA) (enacted in March 2000) meant that for the first time CCTV had direct legislation governing its use in the UK. This paper attempts to apply…
Descriptors: Foreign Countries, School Safety, Safety Equipment, Law Enforcement
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Parry, Marc – Chronicle of Higher Education, 2009
Distance educators won't have to become FBI-style investigators, installing cameras in the homes of online students and scanning fingerprints to ensure that people are who they say they are. At least not yet. The recently reauthorized Higher Education Opportunity Act requires accreditors to monitor steps colleges take to verify that an enrolled…
Descriptors: Distance Education, Privacy, Online Courses, Federal Regulation
Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T. – Journal of Marketing Education, 2010
An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…
Descriptors: Business Administration Education, Business Education, Information Policy, Privacy
Barto, Thomas Peter – ProQuest LLC, 2011
Global electronic markets will profoundly impact commerce in the 21 st century. Brick-and-mortar retailers are using technology for electronic marketing purposes where the familiar layout of the physical store becomes a maze of pulldown menus, product indices, and search features creating a new unknown for consumers and concerns for information…
Descriptors: Internet, Vendors, Information Policy, Business Administration
Thur, Victoria L. – Journal of Access Services, 2009
The U.S. government has sought to restrict the freedoms of its citizens in times of war from World War I to the present. The banners of fear, war, terrorism, and nationwide security placed constitutional rights under a renewed scrutiny. This paper will focus on the passage of laws that restrict academic and intellectual freedoms during war, and…
Descriptors: Intellectual Freedom, Access to Information, National Security, Academic Freedom