Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 42

Full-Text Articles in Education

Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen Nov 2023

Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen

Journal of Cybersecurity Education, Research and Practice

Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …


Hiv Stalks Bodies Like Mine: An Autoethnography Of Self-Disclosure, Stigmatized Identity, And (In)Visibility In Queer Lived Experience, Steven Ryder Mar 2023

Hiv Stalks Bodies Like Mine: An Autoethnography Of Self-Disclosure, Stigmatized Identity, And (In)Visibility In Queer Lived Experience, Steven Ryder

USF Tampa Graduate Theses and Dissertations

This dissertation examines self-disclosure of Human Immunodeficiency Virus (HIV) status within the context of communication between long-standing friends. For the purposes of my study, I define this type of friendship as those who have known me for at least two years and with whom I communicate regularly. These are friends who tend to know a variety of personal details about me, ranging from superficial to private and trivial to essential. I use autoethnography to ground the study in my lived experience. By doing so, I present intimate accounts of my communication with others across my lifespan to function as background …


The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees Jan 2023

The Protection Of Student Data Privacy In Wisconsin School Board Policies, Curtis Clyde Rees

Theses and Dissertations--Education Sciences

American schools have increasingly adopted technology resources to fulfill their educational obligations. These tools are for instruction, communication, and storing and analyzing student information. Student data can be directory information, enrollment records, achievement data, and student-created products. This increased utilization began with the passage of No Child Left Behind in 2001, and the COVID-19 pandemic led to more educational technology use of student data. Districts turned to third-party vendors for assistance with data systems and virtual learning resources. Before, during, and after the pandemic, stakeholders were concerned about information security and the students' privacy. School leaders looked to federal regulations …


Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan Jan 2023

Digital Literacy: A Review Of Literature, Lennie Barblett, Raisa Akifeva, Leanne Lavina, Fiona Boylan

Research outputs 2022 to 2026

This report describes the main themes of collected literature to examine and explain the information in relation to making best practice recommendations for using digital technologies with children, and their families using Better Beginnings programs. These themes include:

  • definitions of literacy,
  • digital literacy in the context of childhood and children’s rights,
  • dimensions of children’s digital literacy,
  • digital technology, children and families,
  • digital divide and diversity,
  • eSafety, privacy, protection,
  • children’s digital literacy learning, and
  • librarian staff as digital literacy mentors and advocates.

The early childhood phase of childhood (particularly birth to age five) is one of the most under - researched …


Maintaining Privacy And Security In Cyberspace: What Everyone Needs To Know, Maureen Mcdermott, Jennifer L. Reeves, Gabriela Mendez, Berta Hayes Capo, Jason Karp Dec 2021

Maintaining Privacy And Security In Cyberspace: What Everyone Needs To Know, Maureen Mcdermott, Jennifer L. Reeves, Gabriela Mendez, Berta Hayes Capo, Jason Karp

FDLA Journal

The growth of technology will always outpace legal and ethical understanding concerning maintaining privacy and security in cyberspace. Remote network security breaches are a common method for taking sensitive information from companies, K-12 school districts, institutions of higher learning, and from social media accounts. Parents, university/college personnel, teachers and other adults working in the K-12 systems are held accountable to higher standards when determining levels of technology infusion especially with distance education.


The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis Jul 2021

The Design Of A Framework For The Detection Of Web-Based Dark Patterns, Andrea Curley, Dympna O'Sullivan, Damian Gordon, Brendan Tierney, Ioannis Stavrakakis

Conference Papers

In the theories of User Interfaces (UI) and User Experience (UX), the goal is generally to help understand the needs of users and how software can be best configured to optimize how the users can interact with it by removing any unnecessary barriers. However, some systems are designed to make people unwillingly agree to share more data than they intend to, or to spend more money than they plan to, using deception or other psychological nudges. User Interface experts have categorized a number of these tricks that are commonly used and have called them Dark Patterns. Dark Patterns are varied …


Invasion Of School Children's Privacy: Teachers Need To Be Put In Timeout, John D. Janicek, Joseph H. Hanks Jan 2021

Invasion Of School Children's Privacy: Teachers Need To Be Put In Timeout, John D. Janicek, Joseph H. Hanks

BYU Education & Law Journal

This article makes the argument that such social media posts constitute a serious invasion of a child’s privacy right, and that the responsibility for enforcement should fall on schools and school districts. However, since such enforcement is currently lacking, this article argues that potential remedies may exist within the framework of federal law. And if local education authorities continue to fail to address the problem, the article argues that a legislative approach might be called for, at the state, or even federal, level.


Student Privacy In The Digital Age, Susan G. Archambault Jan 2021

Student Privacy In The Digital Age, Susan G. Archambault

BYU Education & Law Journal

Students and teachers need to understand what rules govern their digital experience in terms of data being collected from the systems and software they use. Students have a tendency to share personal information online, and are largely unconcerned about third-party access to their data.30 Furthermore, they may feel pressured to waive privacy rights in order to participate in classroom activities requiring the use of educational technology tools.31 The recent COVID-19 pandemic has further exacerbated this problem. In fact, The Future of Privacy Forum (FPF) and National Education Association (NEA) recently released new recommendations for the use of video conferencing platforms …


Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law Dec 2020

Law School News: Rwu Law Dean Seeking To Build On Culture Of Service, Innovation 12/09/2020, Barry Bridges, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly Apr 2020

Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly

Graduate Theses & Dissertations

This exploratory case study examines the impact of text messaging on mentoring relationships when used as an outreach between school counselors and high school students, where established relationships are lacking. An SMS gateway was used to mediate communication between school counselors (N=2) and students (N=5) over a three-month timeframe. The SMS gateway converted email, sent from counselors, to text messages, which were received on mobile devices of students and allowed students to respond back to counselors. Findings indicate that the use of text messaging may ease scheduling of face-to-face meetings between counselors and students, but evidence does not support any …


Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey Apr 2020

Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey

Library Publications and Presentations

This poster focuses on critical questions and examples of how student agency, privacy, and intellectual freedom can become a focus of open pedagogy and alternative assignments.Increasingly, instructors are offering opportunities for students to publicly share their work online — be it a class website, blog, or paper alternatives such as podcast episodes or short videos. These assignments have great potential to impact students’ digital identities and awareness of their own intellectual property rights beyond the parameters of the academic environment. This takes on increased importance when we consider that students from already marginalized identities may be more vulnerable to online …


Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller Apr 2019

Using Free & Open Tools: A Holistic Selection Process Centered On Digital Literacy, Tim Miller

Digital Initiatives Symposium

This session will cover free and open tools as well as teaching strategies for creating and implementing digital/web literacy and digital media instruction. The session will also be useful for people looking for free and open tools for their own projects, including how to get started and how to learn necessary new skills. Considerations such as terms of use, privacy, accessibility and licensing can be as or more important than functionality. Additionally, adopting open tools can advance conversations about open licensing which, in turn, can promote the application of creative commons and public domain licenses to appropriate works. Knowing about …


The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke Apr 2019

The Challenge Of Open: Empowering Students Or Eroding Privacy?, Pauline Rooney, Geraldine Gray, Lee O'Farrell, K.C. O'Rourke

Other resources

Open education can mean different things to different people. A term which frequently refers to the creation, sharing and usage of open educational resources, open education can also refer to the use of technologies which promote collaborative, flexible learning and sharing of teaching practices, thus providing new opportunities for enhancing teaching and learning and assessment practices (Cape Town Open Education Declaration, 2007). Within this context, open education is often promoted as a means of widening access to education, improving equity and enhancing the student learning experience (Creelman, Cronin and Weller 2018). However in an increasingly privacy-conscious era, where data …


Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle Jan 2019

Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle

CCE Theses and Dissertations

Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.

There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …


Undergraduate Students' Attitudes About The Collection, Use, And Privacy Of Search Data In Academic Libraries, Laura W. Gariepy Jan 2019

Undergraduate Students' Attitudes About The Collection, Use, And Privacy Of Search Data In Academic Libraries, Laura W. Gariepy

Theses and Dissertations

The purpose of this study was to understand undergraduate students’ attitudes about search data privacy in academic libraries and their preferences for how librarians should handle information about what students search for, borrow, and download. This is an important area of study due to the increasingly data-driven nature of evaluation, accountability, and improvement in higher education, along with libraries’ professional commitment to privacy, which has historically limited the amount of data collected about student use. Using a qualitative approach through the lens of interpretive description, I used the constant comparative method of data collection and analysis to conduct semi-structured interviews …


Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker Jan 2019

Let The Right Ones In: Supporting Patrons As Content Creators With Libguides And Libguides Cms, Jeffrey M. Mortimore, Ruth L. Baker

Library Faculty Publications

With flexible access and permission features, LibGuides and LibGuides CMS offer an adaptable platform for hosting patron-created content. This paper highlights how librarians at Georgia Southern University opened their LibGuides CMS platform to host faculty and student projects and portfolios. Employing similar techniques, libraries can host a wide range of patron-created content while protecting library-managed guides and assets, controlling access to patron-created content, and protecting patron privacy. This paper provides a detailed overview of access and permission features available in LibGuides and LibGuides CMS, presents two case studies, and offers considerations and best practices for hosting patron-created content.


We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro May 2018

We’Ve Come A Long Way (Baby)! Or Have We? Evolving Intellectual Freedom Issues In The Us And Florida, L. Bryan Cooper, A.D. Beman-Cavallaro

Works of the FIU Libraries

This paper analyzes a shifting landscape of intellectual freedom (IF) in and outside Florida for children, adolescents, teens and adults. National ideals stand in tension with local and state developments, as new threats are visible in historical, legal, and technological context. Examples include doctrinal shifts, legislative bills, electronic surveillance and recent attempts to censor books, classroom texts, and reading lists.

Privacy rights for minors in Florida are increasingly unstable. New assertions of parental rights are part of a larger conservative animus. Proponents of IF can identify a lessening of ideals and standards that began after doctrinal fruition in the 1960s …


Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips Jan 2018

Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips

All Faculty Scholarship

For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …


Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke Mar 2017

Online Learning Integrity Approaches: Current Practices And Future Solutions, Anita Lee-Post, Holly Hapke

Marketing & Supply Chain Faculty Publications

The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising the convenience and flexibility of online learning. Current user authentication solutions such as user ID and password, security questions, voice recognition, or fingerprint identification are not infallible and may violate students’ rights to privacy or cause undue interruptions to their efforts in performing assessment tasks. Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty. Emerging technologies in the …


Blown To Bits Project, David Schmidt Jan 2017

Blown To Bits Project, David Schmidt

Informatics Open Educational Resources

The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …


A Phenomenological Investigation Of Social Networking Site Privacy Awareness Through A Media Literacy Lens, David Magolis, Audra Briggs Dec 2016

A Phenomenological Investigation Of Social Networking Site Privacy Awareness Through A Media Literacy Lens, David Magolis, Audra Briggs

Journal of Media Literacy Education

This research study focused on the social networking site (SNS) awareness of undergraduate students, examining their experiences through the type and extent of the information shared on their SNSs in order to discover the students’ experiences with SNS privacy. A phenomenological research approach was used to interview eight undergraduate to explore the question, “what is the nature of undergraduate students’ social networking privacy?” Each recorded interview lasted up to one hour in duration and was transcribed verbatim. A thematic analysis of the interview data revealed that all of the participants were aware of their online privacy, but each had different …


The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring Apr 2016

The Sky Is Falling, But Not For The Reason You Think, Mark Y. Herring

Winthrop Faculty and Staff Publications

n case you missed it, the world is about to come to an end. I’m not a scryer or a doomsayer, nor am I especially prescient. But judging from the hysteria surrounding the Apple phone/FBI case, one can only conclude that the world is coming to an end, the sky is falling, civilization as we know it is coming to an end if Apple loses its gallant fight for the little millions who bought its phones.


The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell Jan 2016

The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell

Faculty Scholarship

No abstract provided.


The Impact Of Technology, Katina Michael Sep 2014

The Impact Of Technology, Katina Michael

Professor Katina Michael

Consumer electronics have revolutionized the way we live and work. Most students that I know would rather forgo expensive clothing labels than do without their branded smartphone. In fact, some of them would forgo food altogether if it meant their phone could be “always on” and “always with them”, clipped onto the belt buckle, strapped into a pants or jacket sleeve or increasingly into the open palm of their hand. Something happens when our basic needs as humans are overtaken by some other need that was once a distant want at best- plainly confusion in our ability to rightly determine …


Finding The Surprise: A Case Study Of A Faculty Learning Community, Roberta M. Michel Apr 2014

Finding The Surprise: A Case Study Of A Faculty Learning Community, Roberta M. Michel

Academic Leadership Journal in Student Research

This article details a faculty learning community (FLC) that started in 2009 on the campus of a Midwestern University and has evolved into an interdisciplinary research, teaching and social community of practice and learning called SurPriSe. SurPriSe is an acronym that reflects the interest area of the FLC; Sur for surveillance, Pri for privacy, and Se for security. This case study provides understanding of the social context, the institution and the nature of encouraging established faculty to engage in new research and pedagogical interests that are interdisciplinary.


Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies Jan 2014

Growing Ideas - Confidentiality: Respecting The Privacy Of All Families, University Of Maine Center For Community Inclusion And Disability Studies

Early Childhood Resources

Care and education professionals routinely receive confidential information about children and families as part of their work. Maintaining confidentiality is important both legally and ethically.


Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath Jan 2014

Contemporary Privacy Theory Contributions To Learning Analytics, Jennifer Heath

Faculty of Social Sciences - Papers (Archive)

With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems specialists. This paper provides an overview of privacy and considers the potential contribution contemporary privacy theories can make to learning analytics. Conclusions reflect on the suitability of these theories towards the advancement of learning analytics and future research considers the importance of hearing the student voice in this space.


Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte Jan 2014

Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte

Journal of Business & Technology Law

No abstract provided.


Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D Aug 2013

Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D

Georgia International Conference on Information Literacy

See presentation description.


The Research Express Jul 2013

The Research Express

Research Express Newsletter (2014-2016)

  • Confidentiality Matters
  • Georgia Student Sues for Use of Facebook Photo in Educational Program
  • Fair Use Defined
  • ORI offers a sample license to use student work