Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom Dec 2019

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom

Library Philosophy and Practice (e-journal)

Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management …


Understanding The Privacy Methods, Implications, And Challenges Of Educational Data Mining., Tyler Blanco, Liam Smith May 2019

Understanding The Privacy Methods, Implications, And Challenges Of Educational Data Mining., Tyler Blanco, Liam Smith

CURCE Annual Undergraduate Conference

Studies on educational data mining have massively advanced the analytical understanding of student learning, outcome predictions, student modeling, and better evaluation. While the information retrieved can improve educational outcomes, such studies must not break the wall of trust or compromise student privacy. To this end, it’s imperative to understand the methods of how privacy is ensured in the field of educational data mining and learning analytics, the limitations of these strategies, the complications that may follow, and the possible resolutions. In this project, we take a systematic approach to review studies in the educational data mining field. Initially, we examine …