Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

Privacy

Discipline
Institution
Publication Year
Publication

Articles 1 - 25 of 25

Full-Text Articles in Education

A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson Jan 2024

A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson

Research outputs 2022 to 2026

This paper presents a systematic review of K-12 cybersecurity education literature from around the world. 24 academic papers dated from 2013-2023 were eligible for inclusion in the literature established within the research protocol. An additional 19 gray literature sources comprised the total. A range of recurring common topics deemed as aspects of cybersecurity behavior or practice were identified. A variety of cybersecurity competencies and skills are needed for K-12 students to apply their knowledge. As may be expected to be the case with interdisciplinary fields, studies are inherently unclear in the use of their terminology, and this is compounded in …


Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan Jan 2023

Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan

Research outputs 2022 to 2026

This report describes the main themes of collected literature to examine and explain the information in relation to making best practice recommendations for using digital technologies with children, and their families using Better Beginnings programs. These themes include:

  • definitions of literacy,
  • digital literacy in the context of childhood and children’s rights,
  • dimensions of children’s digital literacy,
  • digital technology, children and families,
  • digital divide and diversity,
  • eSafety, privacy, protection,
  • children’s digital literacy learning, and
  • librarian staff as digital literacy mentors and advocates.

The early childhood phase of childhood (particularly birth to age five) is one of the most under - researched …


The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis Jul 2021

The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis

Conference Papers

In the theories of User Interfaces (UI) and User Experience (UX), the goal is generally to help understand the needs of users and how software can be best configured to optimize how the users can interact with it by removing any unnecessary barriers. However, some systems are designed to make people unwillingly agree to share more data than they intend to, or to spend more money than they plan to, using deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. Dark Patterns are varied …


Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law Dec 2020

Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey Apr 2020

Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey

Library Publications and Presentations

This poster focuses on critical questions and examples of how student agency, privacy, and intellectual freedom can become a focus of open pedagogy and alternative assignments.Increasingly, instructors are offering opportunities for students to publicly share their work online — be it a class website, blog, or paper alternatives such as podcast episodes or short videos. These assignments have great potential to impact students’ digital identities and awareness of their own intellectual property rights beyond the parameters of the academic environment. This takes on increased importance when we consider that students from already marginalized identities may be more vulnerable to online …


The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke Apr 2019

The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke

Other resources

Open education can mean different things to different people. A term which frequently refers to the creation, sharing and usage of open educational resources, open education can also refer to the use of technologies which promote collaborative, flexible learning and sharing of teaching practices, thus providing new opportunities for enhancing teaching and learning and assessment practices (Cape Town Open Education Declaration, 2007). Within this context, open education is often promoted as a means of widening access to education, improving equity and enhancing the student learning experience (Creelman, Cronin and Weller 2018). However in an increasingly privacy-conscious era, where data …


Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker Jan 2019

Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker

Library Faculty Publications

With flexible access and permission features, LibGuides and LibGuides CMS offer an adaptable platform for hosting patron-created content. This paper highlights how librarians at Georgia Southern University opened their LibGuides CMS platform to host faculty and student projects and portfolios. Employing similar techniques, libraries can host a wide range of patron-created content while protecting library-managed guides and assets, controlling access to patron-created content, and protecting patron privacy. This paper provides a detailed overview of access and permission features available in LibGuides and LibGuides CMS, presents two case studies, and offers considerations and best practices for hosting patron-created content.


We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro May 2018

We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro

Works of the FIU Libraries

This paper analyzes a shifting landscape of intellectual freedom (IF) in and outside Florida for children, adolescents, teens and adults. National ideals stand in tension with local and state developments, as new threats are visible in historical, legal, and technological context. Examples include doctrinal shifts, legislative bills, electronic surveillance and recent attempts to censor books, classroom texts, and reading lists.

Privacy rights for minors in Florida are increasingly unstable. New assertions of parental rights are part of a larger conservative animus. Proponents of IF can identify a lessening of ideals and standards that began after doctrinal fruition in the 1960s …


Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips Jan 2018

Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips

All Faculty Scholarship

For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …


Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke Mar 2017

Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke

Marketing & Supply Chain Faculty Publications

The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising the convenience and flexibility of online learning. Current user authentication solutions such as user ID and password, security questions, voice recognition, or fingerprint identification are not infallible and may violate students’ rights to privacy or cause undue interruptions to their efforts in performing assessment tasks. Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty. Emerging technologies in the …


The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring Apr 2016

The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring

Winthrop Faculty and Staff Publications

n case you missed it, the world is about to come to an end. I’m not a scryer or a doomsayer, nor am I especially prescient. But judging from the hysteria surrounding the Apple phone/FBI case, one can only conclude that the world is coming to an end, the sky is falling, civilization as we know it is coming to an end if Apple loses its gallant fight for the little millions who bought its phones.


The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell Jan 2016

The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell

Faculty Scholarship

No abstract provided.


Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies Jan 2014

Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies

Early Childhood Resources

Care and education professionals routinely receive confidential information about children and families as part of their work. Maintaining confidentiality is important both legally and ethically.


Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath Jan 2014

Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath

Faculty of Social Sciences - Papers (Archive)

With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems specialists. This paper provides an overview of privacy and considers the potential contribution contemporary privacy theories can make to learning analytics. Conclusions reflect on the suitability of these theories towards the advancement of learning analytics and future research considers the importance of hearing the student voice in this space.


The Research Express Jul 2013

The Research Express

Research Express Newsletter (2014-2016)

  • Confidentiality Matters
  • Georgia Student Sues for Use of Facebook Photo in Educational Program
  • Fair Use Defined
  • ORI offers a sample license to use student work


Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg Jan 2012

Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg

Law Faculty Scholarship

This article argues that searches of student’s cell phone should require a warrant in most circumstances. The amount and personal nature of information on a smart phone warrants special Fourth Amendment protection. This issue is particularly relevant in the public school setting where administrators routinely confiscate phones from students caught using them in school. With more frequency, administrators are looking at the phones, scrolling through text messages and photos, and on some occasions, responding to text messages.

The U.S. Supreme Court in Safford v. Redding, acknowledges the special considerations that school children should be afforded in part because of the …


Data Security On Mobile Devices- A Higher Education Perspective, David Reis Jul 2011

Data Security On Mobile Devices- A Higher Education Perspective, David Reis

Academic Commons and Scott Memorial Library Staff Papers and Presentations

Mobile devices, both personal and Jefferson-owned, are being used everywhere on campus. Everyone knows that patient health information should not be stored on mobile devices, but did you know there are similar restrictions for student information?

If you access your Jefferson email from your mobile device and it contains student email on it, or in your address book, you need to know the requirements to protect that data.

Is your device secure?

AISR and JeffIT are hosting a presentation that will address important data security steps you should take to protect the information on your mobile device.


Beyond Friending: Buddypress And The Social, Networked, Open-Source Classroom, Matthew K. Gold Jan 2011

Beyond Friending: Buddypress And The Social, Networked, Open-Source Classroom, Matthew K. Gold

Publications and Research

Classrooms have always been networks, of a sort, with professors and students forming an interlaced series of nodes that take shape over the course of a semester, but tools like BuddyPress and WordPress can make those networks more open, more porous, and more varied. In very useful ways, the classroom-as-social-network can help create engaging spaces for learning in which students are more connected to one another, to their professors, and to the wider world.


Online Social Presence: A Study Of Score Validity Of The Computer-Mediated Communication Questionnaire, Cherng-Jyh Yen, Chih-Hsiung Tu Jan 2008

Online Social Presence: A Study Of Score Validity Of The Computer-Mediated Communication Questionnaire, Cherng-Jyh Yen, Chih-Hsiung Tu

Educational Leadership & Workforce Development Faculty Publications

The purpose of this study was to conduct a confirmatory factor analysis of the Computer-Mediated Communication Questionnaire scores, using structural equation modeling, to assess the consistency between the empirical data and the hypothesized factor structure of the CMCQ in the proposed models, which is stipulated by the theoretical framework and previous research. Online social presence is a vital affective learning factor that influences online interaction. In this study, online social presence was defined as the degree of feeling, perception, reaction, and trustworthiness of being connected by computer-mediated communication to another intellectual entity through electronic media. Currently, valid instruments to determine …


Research Within The Privacy Regulations: Problems And Solutions For Database Custodians, Ea Mulligan, Wendy Rogers, Annette J. Braunack-Mayer Jan 2006

Research Within The Privacy Regulations: Problems And Solutions For Database Custodians, Ea Mulligan, Wendy Rogers, Annette J. Braunack-Mayer

Faculty of Social Sciences - Papers (Archive)

State and Federal legislation governing health information and privacy in Australia is complex and relatively untested, causing confusion amongst database custodians as to what conduct is required. Some database custodians believe that providing privacy will allay public anxiety and consequently support research. Others argue that data managers have become fearful of litigation and that this will restrict the access of researchers to data. Two of the significant ethical issues to be considered are the right to privacy, and whether using information poses a risk to data subjects. Data custodians have sought to address concerns about privacy in two main ways. …


Hef482 Maintaining A Treasure Chest: Your Health Record (Leader Guide), Mary Ellen Rider Jan 1998

Hef482 Maintaining A Treasure Chest: Your Health Record (Leader Guide), Mary Ellen Rider

University of Nebraska-Lincoln Extension: Historical Materials

This publication offers information concerning compiling a family medical history file.

It is the companion publication to the Participant Manual HEF481 Maintaining A Treasure Chest: Your Health Record


Hef481 Maintaining A Treasure Chest: Your Health Record (Participant Manual), Jodene K. Jurging, Mary Ellen Rider, Rebecca L. Versch, Judy Weber Jan 1998

Hef481 Maintaining A Treasure Chest: Your Health Record (Participant Manual), Jodene K. Jurging, Mary Ellen Rider, Rebecca L. Versch, Judy Weber

University of Nebraska-Lincoln Extension: Historical Materials

The health care system in the United States is changing in ways that require consumers to take more responsibility for their health. The preventive philosophy of health care demands that we move from passive recipients to active consumers of health care. A very important part of health care is maintaining accurate medical records for yourself and members of your family.

You may say, "My physician keeps that record." Have you ever seen a copy of that file? Do you have just one health care provider responsible for your care? Does your medical provider pay your bills? How private is your …


G98-1368 Medical Record Privacy, Mary Ellen Rider, Lisa Ahlberg, Judy Weber Jan 1998

G98-1368 Medical Record Privacy, Mary Ellen Rider, Lisa Ahlberg, Judy Weber

University of Nebraska-Lincoln Extension: Historical Materials

Medical record privacy is an important issue of the 1990s. This NebGuide focuses on access to our medical records, the risks of inappropriate use of medical records, and what you as a health consumer can do should you face those risks.

Many of us think our medical records are confidential, seen only by our doctors. The truth is, however, a number of people have access to them. The real question is whether we have true privacy of our medical records.

Think of all the information in your medical records. In addition to diagnostic and testing information, they contain the details …


Privacy Issues Dealing With Technology : A Review Of The Literature, Kimberly S. Mccoy Jan 1997

Privacy Issues Dealing With Technology : A Review Of The Literature, Kimberly S. Mccoy

Graduate Research Papers

The sophisticated applications of technology are expanding everyday. Unfortunately, so are the many concerns individuals in society are having about their right to privacy. The actual regulations dealing with one's right to privacy has not expand as rapidly as the applications of technology. Individuals using various types of technology are under the assumption their activities are private; however, this is not the case. It does not seem to matter if you are using a computer for communications work, school, or in the "privacy" of your own home, there is absolutely no privacy when dealing with this type of technology.

This …


Ec91-1767 Windbreaks For Rural Living, James R. Brandle, Teresa K. Boes, Bruce Wight Jan 1991

Ec91-1767 Windbreaks For Rural Living, James R. Brandle, Teresa K. Boes, Bruce Wight

University of Nebraska-Lincoln Extension: Historical Materials

In many parts of the United States, the constant force of the wind exaggerates daily weather conditions and can make living in these areas seem unbearable. A well-designed windbreak around the home, ranch, or farmstead slows the wind and improves the overall environment. Farm and ranch windbreaks conserve energy, provide snow control, improve working and recreational environments, enhance wildlife populations, provide visual screening and dust control, and increase the production of various wood and food products.

Ranch and farmstead windbreaks provide the greatest benefits in areas with high winds, large amounts of snow, extreme temperature fluctuations, or minimal natural forest …