Publication Date
| In 2024 | 7 |
| Since 2023 | 11 |
| Since 2020 (last 5 years) | 25 |
| Since 2015 (last 10 years) | 116 |
| Since 2005 (last 20 years) | 418 |
Descriptor
| Information Policy | 900 |
| Access to Information | 368 |
| Internet | 210 |
| Information Technology | 208 |
| Foreign Countries | 180 |
| Information Management | 159 |
| Privacy | 142 |
| Higher Education | 140 |
| Copyrights | 103 |
| Policy Formation | 91 |
| Public Policy | 90 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 46 |
| Media Staff | 25 |
| Policymakers | 22 |
| Teachers | 21 |
| Administrators | 18 |
| Counselors | 7 |
| Parents | 6 |
| Students | 5 |
| Researchers | 4 |
| Community | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| United States | 40 |
| Canada | 34 |
| United Kingdom | 25 |
| Australia | 22 |
| California | 12 |
| New Zealand | 9 |
| European Union | 8 |
| Netherlands | 8 |
| New York | 8 |
| China | 6 |
| Florida | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Sequential Tests of… | 1 |
What Works Clearinghouse Rating
Ess Pokornowski; Roger C. Schonfeld – ITHAKA S+R, 2024
Research libraries are expected to provide and preserve collections in support of their institutions' research and teaching priorities and to support long-term access to cultural, historical, and scientific works. In today's polarized political environment, both libraries and universities have been at the heart of controversy. In this project, the…
Descriptors: Academic Libraries, Librarians, Censorship, Academic Freedom
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2023
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are "general purpose" units (i.e., municipalities, counties, towns and townships).…
Descriptors: Information Security, Computer Security, Local Government, Public Policy
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Cormack, Andrew; Reeve, David – Journal of Learning Analytics, 2022
With student and staff wellbeing a growing concern, several authors have asked whether existing data might help institutions provide better support. By analogy with the established field of Learning Analytics, this might involve identifying causes of stress, improving access to information for those who need it, suggesting options, providing rapid…
Descriptors: Foreign Countries, Well Being, Data Use, Ethics
Priya C. Kumar – Information and Learning Sciences, 2024
Purpose: This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing institutional, rather than community, goals. Design/methodology/approach: This article analyzes theory and prior work on datafication, privacy, data literacy,…
Descriptors: Privacy, Information Policy, Data Use, Literacy
Kim Becnel; Robin A. Moeller – Journal of Education for Library and Information Science, 2024
To understand the effect of library science coursework on student perceptions of issues related to intellectual freedom, researchers surveyed students at the start and end of their enrollment in a Master of Library Science program. When the results were compared, the percentage of graduating students who indicated that they might rethink…
Descriptors: Masters Programs, Graduate Students, Librarians, Librarian Attitudes
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Williams, Julie Ann Stuart; Billings, Philip E.; Estep, Joshua L.; Pinder, Ashanae D. – Business and Professional Communication Quarterly, 2022
Despite organizations increasingly seeking talent to identify data to make better business decisions, many assignments provide the data for the students. This article encourages curriculum to introduce data and information request dimensions, identify data sources, write data and information requests, and reflect on data request examples. We…
Descriptors: Data, Information Dissemination, Information Policy, Communication Strategies
Gilman Ranogajec, Mirna; Badurina, Boris – Education for Information, 2021
In today's Information society it is an everyday scenario to be a part of an online community such as social media. Participation has become almost mandatory to the point of acting as a virtual extremity to one's physical environment. This virtual extremity is the individual's window to the outside world and vice versa. The process of being a part…
Descriptors: Confidence Testing, Social Media, Information Security, Privacy
Manco, Alejandra – SAGE Open, 2022
This literature review aims to examine the approach given to open science policy in the different studies. The main findings are that the approach given to open science has different aspects: policy framing and its geopolitical aspects are described as an asymmetries replication and epistemic governance tool. The main geopolitical aspects of open…
Descriptors: Access to Information, Scientific Research, Data Use, Information Policy
Ben Williamson; Alex Molnar; Faith Boninger – Commercialism in Education Research Unit, 2024
Ignoring their own well-publicized calls to regulate AI development and to pause implementation of its applications, major technology companies such as Google, Microsoft, and Meta are racing to fend off regulation and integrate artificial intelligence (AI) into their platforms. The weight of the available evidence suggests that the current…
Descriptors: Artificial Intelligence, Technology Uses in Education, Influence of Technology, Federal Regulation
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Dinneen, Jesse David; Krtalic, Maja – portal: Libraries and the Academy, 2020
This article discusses how e-mail and e-mail archives can serve as legacy for individuals, families, and societies. Toward this end, it outlines the scope and scale of e-mail as a tool and a task, and gives an overview of the many individual, group, and institutional factors in e-mail management that influence the form and contents of e-mail…
Descriptors: Electronic Mail, Preservation, Archives, Information Management
Australian Government Department of Education, Skills and Employment, 2020
Comprehensive and timely data on vocational education and training (VET) is important for increasing the efficiency and transparency of Australia's VET sector, in order to improve understanding of Australia's VET market and management of the national VET system. The National VET Data Policy (the Policy) brings together requirements for collecting…
Descriptors: Foreign Countries, Vocational Education, Data, Data Collection
Xiaojun Xu; Guanghui Cheng – College & Research Libraries, 2024
The purpose of this study is to explore the realization of users' information rights (IRs) in the smart service of university libraries. Based on the LibQUAL model, principal component analysis (PCA) is used to measure the quality of smart services in university libraries. The contribution weight of various services to the realization of IRs is…
Descriptors: Foreign Countries, Research Libraries, Academic Libraries, Library Services

Direct link
Peer reviewed
