NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Roper, Jerry – ProQuest LLC, 2017
Higher education has experienced challenges defining and implementing copyright compliance. Confusion among faculty and staff appears to be common regarding copyright and fair use. The original copyright doctrine was drafted over 200 years ago, which predates practically all technological advances that have and will continue to occur. Change is…
Descriptors: Heuristics, Information Technology, Copyrights, Higher Education
DeVos, Betsy; Nielsen, Kirstjen M.; Azar, Alex M., II; Whitaker, Matthew – US Department of Education, 2018
In response to the February 14, 2018 shooting at Marjory Stoneman Douglas High School in Parkland, Florida, President Donald Trump established the Federal Commission on School Safety to review safety practices and make meaningful and actionable recommendations of best practices to keep students safe. The Commission conducted field visits,…
Descriptors: School Safety, Violence, Prevention, Best Practices