Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Curriculum and Instruction (8)
- Law (7)
- Social and Behavioral Sciences (7)
- Higher Education (5)
- Agriculture (4)
-
- Library and Information Science (4)
- Life Sciences (4)
- Arts and Humanities (3)
- Computer Sciences (3)
- Educational Administration and Supervision (3)
- Online and Distance Education (3)
- Physical Sciences and Mathematics (3)
- Privacy Law (3)
- Administrative Law (2)
- Computer Law (2)
- Early Childhood Education (2)
- Education Law (2)
- Higher Education Administration (2)
- Information Security (2)
- Law and Society (2)
- Legal Education (2)
- American Studies (1)
- Applied Ethics (1)
- Civil Law (1)
- Civil Procedure (1)
- Civil Rights and Discrimination (1)
- Collection Development and Management (1)
- Communications Law (1)
- Constitutional Law (1)
- Institution
-
- University of Nebraska - Lincoln (4)
- Edith Cowan University (2)
- Georgia Southern University (2)
- Technological University Dublin (2)
- University of Wollongong (2)
-
- Barry University School of Law (1)
- City University of New York (CUNY) (1)
- Florida International University (1)
- Old Dominion University (1)
- Roger Williams University (1)
- The University of Maine (1)
- Thomas Jefferson University (1)
- University of Kentucky (1)
- University of New Hampshire (1)
- University of Northern Iowa (1)
- University of Pennsylvania Carey Law School (1)
- University of Washington Tacoma (1)
- Winthrop University (1)
- Publication Year
- Publication
-
- University of Nebraska-Lincoln Extension: Historical Materials (4)
- Faculty of Social Sciences - Papers (Archive) (2)
- Research outputs 2022 to 2026 (2)
- Academic Commons and Scott Memorial Library Staff Papers and Presentations (1)
- All Faculty Scholarship (1)
-
- Conference Papers (1)
- Early Childhood Resources (1)
- Educational Leadership & Workforce Development Faculty Publications (1)
- Faculty Scholarship (1)
- Graduate Research Papers (1)
- Law Faculty Scholarship (1)
- Library Faculty Publications (1)
- Library Publications and Presentations (1)
- Life of the Law School (1993- ) (1)
- Marketing & Supply Chain Faculty Publications (1)
- Other resources (1)
- Publications and Research (1)
- Research Express Newsletter (2014-2016) (1)
- Winthrop Faculty and Staff Publications (1)
- Works of the FIU Libraries (1)
Articles 1 - 25 of 25
Full-Text Articles in Education
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
Research outputs 2022 to 2026
This paper presents a systematic review of K-12 cybersecurity education literature from around the world. 24 academic papers dated from 2013-2023 were eligible for inclusion in the literature established within the research protocol. An additional 19 gray literature sources comprised the total. A range of recurring common topics deemed as aspects of cybersecurity behavior or practice were identified. A variety of cybersecurity competencies and skills are needed for K-12 students to apply their knowledge. As may be expected to be the case with interdisciplinary fields, studies are inherently unclear in the use of their terminology, and this is compounded in …
Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan
Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan
Research outputs 2022 to 2026
This report describes the main themes of collected literature to examine and explain the information in relation to making best practice recommendations for using digital technologies with children, and their families using Better Beginnings programs. These themes include:
- definitions of literacy,
- digital literacy in the context of childhood and children’s rights,
- dimensions of children’s digital literacy,
- digital technology, children and families,
- digital divide and diversity,
- eSafety, privacy, protection,
- children’s digital literacy learning, and
- librarian staff as digital literacy mentors and advocates.
The early childhood phase of childhood (particularly birth to age five) is one of the most under - researched …
The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis
The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis
Conference Papers
In the theories of User Interfaces (UI) and User Experience (UX), the goal is generally to help understand the needs of users and how software can be best configured to optimize how the users can interact with it by removing any unnecessary barriers. However, some systems are designed to make people unwillingly agree to share more data than they intend to, or to spend more money than they plan to, using deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. Dark Patterns are varied …
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Library Publications and Presentations
This poster focuses on critical questions and examples of how student agency, privacy, and intellectual freedom can become a focus of open pedagogy and alternative assignments.Increasingly, instructors are offering opportunities for students to publicly share their work online — be it a class website, blog, or paper alternatives such as podcast episodes or short videos. These assignments have great potential to impact students’ digital identities and awareness of their own intellectual property rights beyond the parameters of the academic environment. This takes on increased importance when we consider that students from already marginalized identities may be more vulnerable to online …
The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke
The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke
Other resources
Open education can mean different things to different people. A term which frequently refers to the creation, sharing and usage of open educational resources, open education can also refer to the use of technologies which promote collaborative, flexible learning and sharing of teaching practices, thus providing new opportunities for enhancing teaching and learning and assessment practices (Cape Town Open Education Declaration, 2007). Within this context, open education is often promoted as a means of widening access to education, improving equity and enhancing the student learning experience (Creelman, Cronin and Weller 2018). However in an increasingly privacy-conscious era, where data …
Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker
Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker
Library Faculty Publications
With flexible access and permission features, LibGuides and LibGuides CMS offer an adaptable platform for hosting patron-created content. This paper highlights how librarians at Georgia Southern University opened their LibGuides CMS platform to host faculty and student projects and portfolios. Employing similar techniques, libraries can host a wide range of patron-created content while protecting library-managed guides and assets, controlling access to patron-created content, and protecting patron privacy. This paper provides a detailed overview of access and permission features available in LibGuides and LibGuides CMS, presents two case studies, and offers considerations and best practices for hosting patron-created content.
We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro
We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro
Works of the FIU Libraries
This paper analyzes a shifting landscape of intellectual freedom (IF) in and outside Florida for children, adolescents, teens and adults. National ideals stand in tension with local and state developments, as new threats are visible in historical, legal, and technological context. Examples include doctrinal shifts, legislative bills, electronic surveillance and recent attempts to censor books, classroom texts, and reading lists.
Privacy rights for minors in Florida are increasingly unstable. New assertions of parental rights are part of a larger conservative animus. Proponents of IF can identify a lessening of ideals and standards that began after doctrinal fruition in the 1960s …
Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips
Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips
All Faculty Scholarship
For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …
Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke
Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke
Marketing & Supply Chain Faculty Publications
The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising the convenience and flexibility of online learning. Current user authentication solutions such as user ID and password, security questions, voice recognition, or fingerprint identification are not infallible and may violate students’ rights to privacy or cause undue interruptions to their efforts in performing assessment tasks. Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty. Emerging technologies in the …
The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring
The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring
Winthrop Faculty and Staff Publications
n case you missed it, the world is about to come to an end. I’m not a scryer or a doomsayer, nor am I especially prescient. But judging from the hysteria surrounding the Apple phone/FBI case, one can only conclude that the world is coming to an end, the sky is falling, civilization as we know it is coming to an end if Apple loses its gallant fight for the little millions who bought its phones.
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
Faculty Scholarship
No abstract provided.
Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies
Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies
Early Childhood Resources
Care and education professionals routinely receive confidential information about children and families as part of their work. Maintaining confidentiality is important both legally and ethically.
Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath
Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath
Faculty of Social Sciences - Papers (Archive)
With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems specialists. This paper provides an overview of privacy and considers the potential contribution contemporary privacy theories can make to learning analytics. Conclusions reflect on the suitability of these theories towards the advancement of learning analytics and future research considers the importance of hearing the student voice in this space.
The Research Express
Research Express Newsletter (2014-2016)
- Confidentiality Matters
- Georgia Student Sues for Use of Facebook Photo in Educational Program
- Fair Use Defined
- ORI offers a sample license to use student work
Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg
Indecent Exposure: Do Warrantless Searches Of Cell Phones Violate The Fourth Amendment?, Amy Vorenberg
Law Faculty Scholarship
This article argues that searches of student’s cell phone should require a warrant in most circumstances. The amount and personal nature of information on a smart phone warrants special Fourth Amendment protection. This issue is particularly relevant in the public school setting where administrators routinely confiscate phones from students caught using them in school. With more frequency, administrators are looking at the phones, scrolling through text messages and photos, and on some occasions, responding to text messages.
The U.S. Supreme Court in Safford v. Redding, acknowledges the special considerations that school children should be afforded in part because of the …
Data Security On Mobile Devices- A Higher Education Perspective, David Reis
Data Security On Mobile Devices- A Higher Education Perspective, David Reis
Academic Commons and Scott Memorial Library Staff Papers and Presentations
Mobile devices, both personal and Jefferson-owned, are being used everywhere on campus. Everyone knows that patient health information should not be stored on mobile devices, but did you know there are similar restrictions for student information?
If you access your Jefferson email from your mobile device and it contains student email on it, or in your address book, you need to know the requirements to protect that data.
Is your device secure?
AISR and JeffIT are hosting a presentation that will address important data security steps you should take to protect the information on your mobile device.
Beyond Friending: Buddypress And The Social, Networked, Open-Source Classroom, Matthew K. Gold
Beyond Friending: Buddypress And The Social, Networked, Open-Source Classroom, Matthew K. Gold
Publications and Research
Classrooms have always been networks, of a sort, with professors and students forming an interlaced series of nodes that take shape over the course of a semester, but tools like BuddyPress and WordPress can make those networks more open, more porous, and more varied. In very useful ways, the classroom-as-social-network can help create engaging spaces for learning in which students are more connected to one another, to their professors, and to the wider world.
Online Social Presence: A Study Of Score Validity Of The Computer-Mediated Communication Questionnaire, Cherng-Jyh Yen, Chih-Hsiung Tu
Online Social Presence: A Study Of Score Validity Of The Computer-Mediated Communication Questionnaire, Cherng-Jyh Yen, Chih-Hsiung Tu
Educational Leadership & Workforce Development Faculty Publications
The purpose of this study was to conduct a confirmatory factor analysis of the Computer-Mediated Communication Questionnaire scores, using structural equation modeling, to assess the consistency between the empirical data and the hypothesized factor structure of the CMCQ in the proposed models, which is stipulated by the theoretical framework and previous research. Online social presence is a vital affective learning factor that influences online interaction. In this study, online social presence was defined as the degree of feeling, perception, reaction, and trustworthiness of being connected by computer-mediated communication to another intellectual entity through electronic media. Currently, valid instruments to determine …
Research Within The Privacy Regulations: Problems And Solutions For Database Custodians, Ea Mulligan, Wendy Rogers, Annette J. Braunack-Mayer
Research Within The Privacy Regulations: Problems And Solutions For Database Custodians, Ea Mulligan, Wendy Rogers, Annette J. Braunack-Mayer
Faculty of Social Sciences - Papers (Archive)
State and Federal legislation governing health information and privacy in Australia is complex and relatively untested, causing confusion amongst database custodians as to what conduct is required. Some database custodians believe that providing privacy will allay public anxiety and consequently support research. Others argue that data managers have become fearful of litigation and that this will restrict the access of researchers to data. Two of the significant ethical issues to be considered are the right to privacy, and whether using information poses a risk to data subjects. Data custodians have sought to address concerns about privacy in two main ways. …
Hef482 Maintaining A Treasure Chest: Your Health Record (Leader Guide), Mary Ellen Rider
Hef482 Maintaining A Treasure Chest: Your Health Record (Leader Guide), Mary Ellen Rider
University of Nebraska-Lincoln Extension: Historical Materials
This publication offers information concerning compiling a family medical history file.
It is the companion publication to the Participant Manual HEF481 Maintaining A Treasure Chest: Your Health Record
Hef481 Maintaining A Treasure Chest: Your Health Record (Participant Manual), Jodene K. Jurging, Mary Ellen Rider, Rebecca L. Versch, Judy Weber
Hef481 Maintaining A Treasure Chest: Your Health Record (Participant Manual), Jodene K. Jurging, Mary Ellen Rider, Rebecca L. Versch, Judy Weber
University of Nebraska-Lincoln Extension: Historical Materials
The health care system in the United States is changing in ways that require consumers to take more responsibility for their health. The preventive philosophy of health care demands that we move from passive recipients to active consumers of health care. A very important part of health care is maintaining accurate medical records for yourself and members of your family.
You may say, "My physician keeps that record." Have you ever seen a copy of that file? Do you have just one health care provider responsible for your care? Does your medical provider pay your bills? How private is your …
G98-1368 Medical Record Privacy, Mary Ellen Rider, Lisa Ahlberg, Judy Weber
G98-1368 Medical Record Privacy, Mary Ellen Rider, Lisa Ahlberg, Judy Weber
University of Nebraska-Lincoln Extension: Historical Materials
Medical record privacy is an important issue of the 1990s. This NebGuide focuses on access to our medical records, the risks of inappropriate use of medical records, and what you as a health consumer can do should you face those risks.
Many of us think our medical records are confidential, seen only by our doctors. The truth is, however, a number of people have access to them. The real question is whether we have true privacy of our medical records.
Think of all the information in your medical records. In addition to diagnostic and testing information, they contain the details …
Privacy Issues Dealing With Technology : A Review Of The Literature, Kimberly S. Mccoy
Privacy Issues Dealing With Technology : A Review Of The Literature, Kimberly S. Mccoy
Graduate Research Papers
The sophisticated applications of technology are expanding everyday. Unfortunately, so are the many concerns individuals in society are having about their right to privacy. The actual regulations dealing with one's right to privacy has not expand as rapidly as the applications of technology. Individuals using various types of technology are under the assumption their activities are private; however, this is not the case. It does not seem to matter if you are using a computer for communications work, school, or in the "privacy" of your own home, there is absolutely no privacy when dealing with this type of technology.
This …
Ec91-1767 Windbreaks For Rural Living, James R. Brandle, Teresa K. Boes, Bruce Wight
Ec91-1767 Windbreaks For Rural Living, James R. Brandle, Teresa K. Boes, Bruce Wight
University of Nebraska-Lincoln Extension: Historical Materials
In many parts of the United States, the constant force of the wind exaggerates daily weather conditions and can make living in these areas seem unbearable. A well-designed windbreak around the home, ranch, or farmstead slows the wind and improves the overall environment. Farm and ranch windbreaks conserve energy, provide snow control, improve working and recreational environments, enhance wildlife populations, provide visual screening and dust control, and increase the production of various wood and food products.
Ranch and farmstead windbreaks provide the greatest benefits in areas with high winds, large amounts of snow, extreme temperature fluctuations, or minimal natural forest …