Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (16)
- Law (13)
- Curriculum and Instruction (10)
- Educational Administration and Supervision (7)
- Arts and Humanities (6)
-
- Library and Information Science (6)
- Online and Distance Education (6)
- Business (5)
- Computer Sciences (5)
- Higher Education (5)
- Physical Sciences and Mathematics (5)
- Privacy Law (5)
- Agriculture (4)
- Educational Technology (4)
- Life Sciences (4)
- Teacher Education and Professional Development (4)
- Technology and Innovation (4)
- Communication (3)
- Computer Law (3)
- Education Law (3)
- Educational Methods (3)
- Engineering (3)
- Higher Education Administration (3)
- Information Security (3)
- Medicine and Health Sciences (3)
- Other Education (3)
- Administrative Law (2)
- American Studies (2)
- Communication Technology and New Media (2)
- Institution
-
- University of Nebraska - Lincoln (4)
- Georgia Southern University (3)
- University of Wollongong (3)
- Brigham Young University (2)
- Edith Cowan University (2)
-
- Fort Hays State University (2)
- Nova Southeastern University (2)
- Technological University Dublin (2)
- University of Kentucky (2)
- American University in Cairo (1)
- Arcadia University (1)
- Barry University School of Law (1)
- City University of New York (CUNY) (1)
- Florida International University (1)
- Kennesaw State University (1)
- Old Dominion University (1)
- Roger Williams University (1)
- Southwestern Oklahoma State University (1)
- The University of Maine (1)
- Thomas Jefferson University (1)
- University of Maryland Francis King Carey School of Law (1)
- University of New Hampshire (1)
- University of Northern Iowa (1)
- University of Pennsylvania Carey Law School (1)
- University of Rhode Island (1)
- University of San Diego (1)
- University of South Florida (1)
- University of Washington Tacoma (1)
- Virginia Commonwealth University (1)
- Winthrop University (1)
- Publication Year
- Publication
-
- University of Nebraska-Lincoln Extension: Historical Materials (4)
- BYU Education & Law Journal (2)
- Faculty of Social Sciences - Papers (Archive) (2)
- Research outputs 2022 to 2026 (2)
- Theses and Dissertations (2)
-
- Academic Commons and Scott Memorial Library Staff Papers and Presentations (1)
- Academic Leadership Journal in Student Research (1)
- Administrative Issues Journal (1)
- All Faculty Scholarship (1)
- Associate Professor Katina Michael (1)
- CCE Theses and Dissertations (1)
- Conference Papers (1)
- Digital Initiatives Symposium (1)
- Early Childhood Resources (1)
- Educational Leadership & Workforce Development Faculty Publications (1)
- FDLA Journal (1)
- Faculty Scholarship (1)
- Georgia International Conference on Information Literacy (1)
- Graduate Research Papers (1)
- Graduate Theses & Dissertations (1)
- Informatics Open Educational Resources (1)
- Journal of Business & Technology Law (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Journal of Media Literacy Education (1)
- Law Faculty Scholarship (1)
- Library Faculty Publications (1)
- Library Publications and Presentations (1)
- Life of the Law School (1993- ) (1)
- Marketing & Supply Chain Faculty Publications (1)
- Other resources (1)
Articles 1 - 30 of 43
Full-Text Articles in Education
Digital Intelligence In Egypt’S K-12 Public Schools: Educator’ Perspectives, Mohammed Al Mousa
Digital Intelligence In Egypt’S K-12 Public Schools: Educator’ Perspectives, Mohammed Al Mousa
Theses and Dissertations
Technological integration has been a dominant feature of Egypt’s education recently, especially after the announcement of the Education 2.0 initiative, which aims to transform Egypt's education to digital-based and skill-based learning (UNICEF, n.d.), Ever since, public schools in Egypt started adopting technology into teaching practices through online classes, digital textbooks, e-learning platforms, and digital examinations. This educational transformation requires teachers and students to possess the knowledge, skills, attitudes, and values to become effective and responsible users of the transforming digital education system and the digital world in general, which are collectively known as Digital Intelligence (DQ). Despite the substantial role …
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
Research outputs 2022 to 2026
This paper presents a systematic review of K-12 cybersecurity education literature from around the world. 24 academic papers dated from 2013-2023 were eligible for inclusion in the literature established within the research protocol. An additional 19 gray literature sources comprised the total. A range of recurring common topics deemed as aspects of cybersecurity behavior or practice were identified. A variety of cybersecurity competencies and skills are needed for K-12 students to apply their knowledge. As may be expected to be the case with interdisciplinary fields, studies are inherently unclear in the use of their terminology, and this is compounded in …
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
Hiv Stalks Bodies Like Mine: An Autoethnography Of Self-Disclosure, Stigmatized Identity, And (In)Visibility In Queer Lived Experience, Steven Ryder
USF Tampa Graduate Theses and Dissertations
This dissertation examines self-disclosure of Human Immunodeficiency Virus (HIV) status within the context of communication between long-standing friends. For the purposes of my study, I define this type of friendship as those who have known me for at least two years and with whom I communicate regularly. These are friends who tend to know a variety of personal details about me, ranging from superficial to private and trivial to essential. I use autoethnography to ground the study in my lived experience. By doing so, I present intimate accounts of my communication with others across my lifespan to function as background …
The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees
The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees
Theses and Dissertations--Education Sciences
American schools have increasingly adopted technology resources to fulfill their educational obligations. These tools are for instruction, communication, and storing and analyzing student information. Student data can be directory information, enrollment records, achievement data, and student-created products. This increased utilization began with the passage of No Child Left Behind in 2001, and the COVID-19 pandemic led to more educational technology use of student data. Districts turned to third-party vendors for assistance with data systems and virtual learning resources. Before, during, and after the pandemic, stakeholders were concerned about information security and the students' privacy. School leaders looked to federal regulations …
Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan
Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan
Research outputs 2022 to 2026
This report describes the main themes of collected literature to examine and explain the information in relation to making best practice recommendations for using digital technologies with children, and their families using Better Beginnings programs. These themes include:
- definitions of literacy,
- digital literacy in the context of childhood and children’s rights,
- dimensions of children’s digital literacy,
- digital technology, children and families,
- digital divide and diversity,
- eSafety, privacy, protection,
- children’s digital literacy learning, and
- librarian staff as digital literacy mentors and advocates.
The early childhood phase of childhood (particularly birth to age five) is one of the most under - researched …
Maintaining Privacy And Security In Cyberspace: What Everyone Needs To Know, Maureen Mcdermott, Jennifer L. Reeves, Gabriela Mendez, Berta Hayes Capo, Jason Karp
Maintaining Privacy And Security In Cyberspace: What Everyone Needs To Know, Maureen Mcdermott, Jennifer L. Reeves, Gabriela Mendez, Berta Hayes Capo, Jason Karp
FDLA Journal
The growth of technology will always outpace legal and ethical understanding concerning maintaining privacy and security in cyberspace. Remote network security breaches are a common method for taking sensitive information from companies, K-12 school districts, institutions of higher learning, and from social media accounts. Parents, university/college personnel, teachers and other adults working in the K-12 systems are held accountable to higher standards when determining levels of technology infusion especially with distance education.
The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis
The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis
Conference Papers
In the theories of User Interfaces (UI) and User Experience (UX), the goal is generally to help understand the needs of users and how software can be best configured to optimize how the users can interact with it by removing any unnecessary barriers. However, some systems are designed to make people unwillingly agree to share more data than they intend to, or to spend more money than they plan to, using deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. Dark Patterns are varied …
Invasion Of School Children's Privacy: Teachers Need To Be Put In Timeout, John D. Janicek, Joseph H. Hanks
Invasion Of School Children's Privacy: Teachers Need To Be Put In Timeout, John D. Janicek, Joseph H. Hanks
BYU Education & Law Journal
This article makes the argument that such social media posts constitute a serious invasion of a child’s privacy right, and that the responsibility for enforcement should fall on schools and school districts. However, since such enforcement is currently lacking, this article argues that potential remedies may exist within the framework of federal law. And if local education authorities continue to fail to address the problem, the article argues that a legislative approach might be called for, at the state, or even federal, level.
Student Privacy In The Digital Age, Susan G. Archambault
Student Privacy In The Digital Age, Susan G. Archambault
BYU Education & Law Journal
Students and teachers need to understand what rules govern their digital experience in terms of data being collected from the systems and software they use. Students have a tendency to share personal information online, and are largely unconcerned about third-party access to their data.30 Furthermore, they may feel pressured to waive privacy rights in order to participate in classroom activities requiring the use of educational technology tools.31 The recent COVID-19 pandemic has further exacerbated this problem. In fact, The Future of Privacy Forum (FPF) and National Education Association (NEA) recently released new recommendations for the use of video conferencing platforms …
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly
Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly
Graduate Theses & Dissertations
This exploratory case study examines the impact of text messaging on mentoring relationships when used as an outreach between school counselors and high school students, where established relationships are lacking. An SMS gateway was used to mediate communication between school counselors (N=2) and students (N=5) over a three-month timeframe. The SMS gateway converted email, sent from counselors, to text messages, which were received on mobile devices of students and allowed students to respond back to counselors. Findings indicate that the use of text messaging may ease scheduling of face-to-face meetings between counselors and students, but evidence does not support any …
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Library Publications and Presentations
This poster focuses on critical questions and examples of how student agency, privacy, and intellectual freedom can become a focus of open pedagogy and alternative assignments.Increasingly, instructors are offering opportunities for students to publicly share their work online — be it a class website, blog, or paper alternatives such as podcast episodes or short videos. These assignments have great potential to impact students’ digital identities and awareness of their own intellectual property rights beyond the parameters of the academic environment. This takes on increased importance when we consider that students from already marginalized identities may be more vulnerable to online …
Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller
Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller
Digital Initiatives Symposium
This session will cover free and open tools as well as teaching strategies for creating and implementing digital/web literacy and digital media instruction. The session will also be useful for people looking for free and open tools for their own projects, including how to get started and how to learn necessary new skills. Considerations such as terms of use, privacy, accessibility and licensing can be as or more important than functionality. Additionally, adopting open tools can advance conversations about open licensing which, in turn, can promote the application of creative commons and public domain licenses to appropriate works. Knowing about …
The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke
The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke
Other resources
Open education can mean different things to different people. A term which frequently refers to the creation, sharing and usage of open educational resources, open education can also refer to the use of technologies which promote collaborative, flexible learning and sharing of teaching practices, thus providing new opportunities for enhancing teaching and learning and assessment practices (Cape Town Open Education Declaration, 2007). Within this context, open education is often promoted as a means of widening access to education, improving equity and enhancing the student learning experience (Creelman, Cronin and Weller 2018). However in an increasingly privacy-conscious era, where data …
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle
CCE Theses and Dissertations
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.
There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …
Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker
Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker
Library Faculty Publications
With flexible access and permission features, LibGuides and LibGuides CMS offer an adaptable platform for hosting patron-created content. This paper highlights how librarians at Georgia Southern University opened their LibGuides CMS platform to host faculty and student projects and portfolios. Employing similar techniques, libraries can host a wide range of patron-created content while protecting library-managed guides and assets, controlling access to patron-created content, and protecting patron privacy. This paper provides a detailed overview of access and permission features available in LibGuides and LibGuides CMS, presents two case studies, and offers considerations and best practices for hosting patron-created content.
Undergraduate Students' Attitudes About The Collection, Use, And Privacy Of Search Data In Academic Libraries, Laura W. Gariepy
Undergraduate Students' Attitudes About The Collection, Use, And Privacy Of Search Data In Academic Libraries, Laura W. Gariepy
Theses and Dissertations
The purpose of this study was to understand undergraduate students’ attitudes about search data privacy in academic libraries and their preferences for how librarians should handle information about what students search for, borrow, and download. This is an important area of study due to the increasingly data-driven nature of evaluation, accountability, and improvement in higher education, along with libraries’ professional commitment to privacy, which has historically limited the amount of data collected about student use. Using a qualitative approach through the lens of interpretive description, I used the constant comparative method of data collection and analysis to conduct semi-structured interviews …
We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro
We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro
Works of the FIU Libraries
This paper analyzes a shifting landscape of intellectual freedom (IF) in and outside Florida for children, adolescents, teens and adults. National ideals stand in tension with local and state developments, as new threats are visible in historical, legal, and technological context. Examples include doctrinal shifts, legislative bills, electronic surveillance and recent attempts to censor books, classroom texts, and reading lists.
Privacy rights for minors in Florida are increasingly unstable. New assertions of parental rights are part of a larger conservative animus. Proponents of IF can identify a lessening of ideals and standards that began after doctrinal fruition in the 1960s …
Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips
Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips
All Faculty Scholarship
For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …
Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke
Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke
Marketing & Supply Chain Faculty Publications
The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising the convenience and flexibility of online learning. Current user authentication solutions such as user ID and password, security questions, voice recognition, or fingerprint identification are not infallible and may violate students’ rights to privacy or cause undue interruptions to their efforts in performing assessment tasks. Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty. Emerging technologies in the …
Blown To Bits Project, David Schmidt
Blown To Bits Project, David Schmidt
Informatics Open Educational Resources
The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …
A Phenomenological Investigation Of Social Networking Site Privacy Awareness Through A Media Literacy Lens, David Magolis, Audra Briggs
A Phenomenological Investigation Of Social Networking Site Privacy Awareness Through A Media Literacy Lens, David Magolis, Audra Briggs
Journal of Media Literacy Education
This research study focused on the social networking site (SNS) awareness of undergraduate students, examining their experiences through the type and extent of the information shared on their SNSs in order to discover the students’ experiences with SNS privacy. A phenomenological research approach was used to interview eight undergraduate to explore the question, “what is the nature of undergraduate students’ social networking privacy?” Each recorded interview lasted up to one hour in duration and was transcribed verbatim. A thematic analysis of the interview data revealed that all of the participants were aware of their online privacy, but each had different …
The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring
The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring
Winthrop Faculty and Staff Publications
n case you missed it, the world is about to come to an end. I’m not a scryer or a doomsayer, nor am I especially prescient. But judging from the hysteria surrounding the Apple phone/FBI case, one can only conclude that the world is coming to an end, the sky is falling, civilization as we know it is coming to an end if Apple loses its gallant fight for the little millions who bought its phones.
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
Faculty Scholarship
No abstract provided.
Finding The Surprise: A Case Study Of A Faculty Learning Community, Roberta M. Michel
Finding The Surprise: A Case Study Of A Faculty Learning Community, Roberta M. Michel
Academic Leadership Journal in Student Research
This article details a faculty learning community (FLC) that started in 2009 on the campus of a Midwestern University and has evolved into an interdisciplinary research, teaching and social community of practice and learning called SurPriSe. SurPriSe is an acronym that reflects the interest area of the FLC; Sur for surveillance, Pri for privacy, and Se for security. This case study provides understanding of the social context, the institution and the nature of encouraging established faculty to engage in new research and pedagogical interests that are interdisciplinary.
Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies
Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies
Early Childhood Resources
Care and education professionals routinely receive confidential information about children and families as part of their work. Maintaining confidentiality is important both legally and ethically.
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte
Journal of Business & Technology Law
No abstract provided.
Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath
Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath
Faculty of Social Sciences - Papers (Archive)
With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems specialists. This paper provides an overview of privacy and considers the potential contribution contemporary privacy theories can make to learning analytics. Conclusions reflect on the suitability of these theories towards the advancement of learning analytics and future research considers the importance of hearing the student voice in this space.
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Georgia International Conference on Information Literacy
See presentation description.