NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 91 to 105 of 1,926 results Save | Export
Scibelli, David B. – ProQuest LLC, 2013
With the Internet advancements of information systems and social media channels, consumer data has become a valuable source for companies and social networking communities. These Internet businesses are allowed to use and share their customers' information, with minimal regulatory intervention other than in health and financial areas. This…
Descriptors: Internet, Consumer Economics, Privacy, Trust (Psychology)
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Data Quality Campaign, 2017
Over the past decade, states have made enormous progress in collecting, using, and reporting education data in service of learning--although state legislation has primarily focused on implementing the robust privacy and security protections and data governance structures that make data use safe. In the 2017 legislative session, data privacy…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
National Forum on Education Statistics, 2020
The "Forum Guide to Data Governance" highlights how data governance programs benefit education agencies and provide timely and useful best practices, examples, and resources for agencies implementing or updating their data governance programs. This resource is intended to address the needs of federal, state, and local agencies related…
Descriptors: Data, Governance, Information Security, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Masson, Helen; Balfe, Myles; Hackett, Simon; Phillips, Josie – Journal of Sexual Aggression, 2012
This methodological paper details the process of embarking on a follow-up study of young people with sexual behaviour problems who were known to services in the 1990s and who are now young adults in their 20s or early 30s. In the context of the importance of such follow-up work, the overall aim and objectives of the funded research project are…
Descriptors: Behavior Problems, Young Adults, Followup Studies, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Xieling; Zou, Di; Xie, Haoran; Wang, Fu Lee – IEEE Transactions on Learning Technologies, 2023
Research on Educational Metaverse (Edu-Metaverse) has developed into an active research field. Based on 310 academic papers published from 2004 to 2022, this study identifies contributors, scientific cooperations, and research themes using bibliometrics, social network analysis, topic modeling, and keyword analysis. Results suggest that…
Descriptors: Computer Simulation, Technology Uses in Education, Bibliometrics, Social Networks
Aalders, Rachel – Australian Institute of Health and Welfare, 2012
Current research demonstrates relationships between child abuse and neglect, homelessness and criminal activity. This report presents key findings from analysis of a data set linking three community-sector data collections: Supported Accommodation Assistance Program (SAAP), juvenile justice supervision, and child protection notifications and…
Descriptors: Child Abuse, Social Isolation, Juvenile Justice, Young Adults
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Baran Kaynak; Osman Tuna; Ugur Ozbek; Ali Aksoy; Ahmet Ozmen; M. Baris Horzum; Burak Gol – Turkish Online Journal of Distance Education, 2023
COVID-19 coronavirus pandemic has affected higher education institutions all over the world, causing face-to-face education to cease. Schools have tried to carry out educational activities through online teaching either by using on premise infrastructure or by leasing cloud based online platforms. Although these platforms are convenient, most of…
Descriptors: Distance Education, Learning Management Systems, Information Storage, Electronic Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivanova, Svetlana S.; Aksoy, Yesim Üstün; Krasilnikova, Yulia S.; Mashkin, Nikolay A.; Chizh, Nina V.; Knyazeva, Svetlana A. – EURASIA Journal of Mathematics, Science and Technology Education, 2022
The present research aims to ascertain the views of the people in Russia, about their levels of awareness in terms of hygiene and personal care for protection against the coronavirus. Data for this research were collected through an online questionnaire developed by researchers using a quantitative research approach. A total of 439 people living…
Descriptors: Foreign Countries, COVID-19, Pandemics, Hygiene
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Peer reviewed Peer reviewed
Direct linkDirect link
Cambridge, Paul; Beadle-Brown, Julie; Milne, Alisoun; Mansell, Jim; Whelton, Beckie – Journal of Applied Research in Intellectual Disabilities, 2011
Background: Adult protection monitoring data held by local authorities in England provide opportunities to examine referrals for alleged sexual abuse for people with intellectual disability to identify patterns of risk. Methods: Adult protection monitoring data collected by two local authorities was analysed, with referrals for alleged sexual…
Descriptors: Sexual Abuse, Mental Retardation, Risk Management, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Borrett, Donald S.; Sampson, Heather; Cavoukian, Ann – Research Ethics, 2017
Privacy by Design, a globally accepted framework for personal data management and privacy protection, advances the view that privacy cannot be assured solely by compliance with regulatory frameworks but must become an organisation's default mode of operation. We are proposing a similar template for the research ethics review process. The Research…
Descriptors: Research Design, Ethics, Information Management, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kaban, Abdullatif – Athens Journal of Education, 2021
Do we care about the security on the internet environment the way we do in the daily life safety of our children? In order to answer this question, this study aims to reveal what kind of education is provided at school about using secure internet. In accordance with this purpose, Information Technologies and Software Course textbooks at primary…
Descriptors: Internet, Information Security, Information Technology, Textbooks
Kamara, Kesselly Sheick – ProQuest LLC, 2019
The problem addressed by this study is the strategies analysts need in higher education institutions to improve the protection of personally identifiable and sensitive data. The qualitative exploratory design was used to examine the strategies used by nine analysts. The combined experience of the nine analysts in data analytics, cyber security,…
Descriptors: Higher Education, Information Security, Privacy, Ownership
Minara Mordecai – ProQuest LLC, 2022
Advances in educational technology have led to unprecedented accumulation of student information, but there is limited research to inform school practices in protecting student data. At a minimum, school districts must remain in compliance with increasingly complex state and federal laws on student privacy. Moreover, increased cyberattacks on K-12…
Descriptors: Information Security, Privacy, Technological Advancement, Educational Innovation
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  129