Trust, Because You Can't Verify:Privacy and Security Hurdles in Education Technology Acquisition Practices.
Easton KelsoAnanta SonejiSazzadur RahamanYan SoshitaishviliRakibul HasanPublished in: CoRR (2024)
Keyphrases
- security services
- security issues
- privacy concerns
- statistical databases
- media technology
- security concerns
- case study
- st century
- trust relationships
- protection mechanisms
- ethical issues
- information security
- personal information
- privacy preserving
- privacy policies
- social issues
- policy enforcement
- information communication technologies
- professional practice
- sensitive data
- personal data
- data security
- privacy issues
- access control
- preserving privacy
- knowledge society
- security properties
- confidential information
- security risks
- access control models
- security management
- identity management
- security threats
- security and privacy issues
- virtual teams
- trust model
- intrusion detection
- security requirements
- electronic transactions
- security protocols
- security mechanisms
- electronic payment
- communication skills
- security policies
- sensitive information
- electronic commerce
- higher education
- digital rights management
- trusted computing
- information and communication technologies
- technology integration
- data privacy
- private information
- third party
- smart card
- public key infrastructure
- biometric template
- educational technology
- classroom practice
- rfid systems
- educational practices
- authentication protocol
- privacy preserving data mining
- e learning