Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 8 |
| Information Dissemination | 8 |
| Privacy | 8 |
| Access to Information | 4 |
| Computer Networks | 3 |
| Computers | 3 |
| Educational Technology | 3 |
| Ethics | 3 |
| Foreign Countries | 3 |
| Internet | 3 |
| School Policy | 3 |
| More ▼ | |
Source
| International Association for… | 2 |
| Chronicle of Higher Education | 1 |
| ProQuest LLC | 1 |
| Review of Education | 1 |
Author
| Inmaculada Arnedillo Sánchez,… | 1 |
| Jaye-Jaye Johnson | 1 |
| Lorenzen, Elizabeth A., Ed. | 1 |
| McCollum, Roy | 1 |
| Pedro Isaías, Editor | 1 |
| Piet Kommers, Editor | 1 |
| Sena Nur Kutluboga | 1 |
| Titus, Aaron | 1 |
| Yusuf Kiziltas | 1 |
Publication Type
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
Audience
| Policymakers | 1 |
Location
| Brazil | 2 |
| Estonia | 2 |
| Greece | 2 |
| Italy | 2 |
| Philippines | 2 |
| Portugal | 2 |
| Turkey | 2 |
| United Kingdom | 2 |
| Asia | 1 |
| Australia | 1 |
| Connecticut | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jaye-Jaye Johnson – ProQuest LLC, 2024
Educational technology (EdTech) interoperability throughout cyberspace provides the financial opportunity for collecting and selling of student privacy information. The research problem addressed throughout this study is the public school district leaders' (SDLs) understanding of EdTech cyber security practices and policies (EdTechCSPP). Little is…
Descriptors: Public Schools, School Districts, Computer Security, Information Security
Yusuf Kiziltas; Sena Nur Kutluboga – Review of Education, 2025
Social media platforms are entering schools and even classrooms today. Students' early acquaintance with social media platforms brings up the disadvantages and advantages of social media platforms. The use of social media platforms against students and the risks they pose to them place a responsibility on teachers and parents. However,…
Descriptors: Information Dissemination, Sharing Behavior, Elementary School Students, Social Media
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services
Titus, Aaron – Chronicle of Higher Education, 2008
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Descriptors: Privacy, Educational Environment, Internet, Data
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Lorenzen, Elizabeth A., Ed. – 1996
This book contains 11 papers examining career planning and job searching in the information age. The following papers are included: "The Librarian's Role in the Job Search of the Future: Issues and Ethics in the Electronic Environment" (Elizabeth A. Lorenzen); "The Internet as Career, Job, and Employment Resource: Transition, Assimilation,…
Descriptors: Career Education, Career Planning, Computer Security, Ethics
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Direct link
Peer reviewed
