Analysis of Local Governance and Legal Protection of Students' Information Security in the Context of Sustainable Development of Digital Education

Authors

  • Wen Shi Ph.D Candidate, Southeast University, Southeast University Jiulonghu Campus, No. 2 Southeast University Road, 211189, Nanjing, Jiangsu Province, China

DOI:

https://doi.org/10.52152/22.4.435-458(2024)

Keywords:

digital education, student information, information security, school obligation system, data management, information literacy

Abstract

Local governments are dealing with student information more and more frequently, resulting in the risk of student information being leaked, so it is necessary to introduce relevant policies, laws and regulations to standardize information collection activities and improve the level of social information governance. Therefore, this study proposes three hypotheses: on the one hand, whether the information policy issued by the local government can guide students' information collection activities, and on the other hand, whether the introduction of local laws and regulations can provide protection for students' information security; Finally, whether public participation can provide supervision for student information collection and governance, and create a good public management environment. The results show that local information laws and regulations can regulate the behavior of students' information collection and clarify the purpose and direction of students' information collection. At the same time, laws and regulations such as privacy protection and local codes of conduct can improve the security of student information and ensure the legal collection of information. The active participation of the public is conducive to the public information collection environment and ensures the overall security of student information. Therefore, local government policies, laws, and regulations can provide assurance and support for students' information security and promote the sustainable development of digital education.

References

Al-Janabi, S., & Al-Shourbaji, I. (2016). A study of cyber security awareness in educational environment in the Middle East. Journal of Information & Knowledge Management, 15(01), 1650007.

Andrews, J. C., Walker, K. L., & Kees, J. (2020). Children and online privacy protection: Empowerment from cognitive defense strategies. Journal of Public Policy & Marketing, 39(2), 205-219.

Bo, M., & Onwubuya, G. C. (2022). The role of legislation in K-12 school discipline: The silence of action. Frontiers in Psychology, 13, 916925.

Bongiovanni, I. (2019). The least secure places in the universe? A systematic literature review on information security management in higher education. Computers & Security, 86, 350-357.

Buzzetto-More, N. (2008). Student perceptions of various e-learning components. Interdisciplinary Journal of E-learning and Learning Objects, 4(1), 113-135.

Chen, M., Wang, X., Wang, J., Zuo, C., Tian, J., & Cui, Y. (2021). Factors affecting college students’ continuous intention to use online course platform. SN Computer Science, 2, 1-11.

Chen, M., Wang, X., Wang, J., Zuo, C., Tian, J., & Cui, Y. (2021). Factors affecting college students’ continuous intention to use online course platform. SN Computer Science, 2, 1-11.

Chen, X., Ma, Z., Qin, Y., & Gu, Z. (2020). Structure and function of humanistic value system of education informatization. E-Education Research, 41(8), 109-114.

Chen, X., Zou, D., Xie, H., Cheng, G., & Liu, C. (2022). Two decades of artificial intelligence in education. Educational Technology & Society, 25(1), 28-47.

Deng, W. (2020). Gaoxiao xuesheng geren xinxi falü baohu de xianzhuang ji youhua [The current situation and optimization of the legal protection of personal information of college students]. The Party Building and Ideological Education in Schools, (18), 67-69.

Du, Y., Xiang, L., & Li, W. (2015). Rethinking on the theory of information lifecycle under the background of big data. Information Studies: Theory & Application, 38(5), 25-29.

Felton, A., & Stickley, T. (2004). Pedagogy, power and service user involvement. Journal of Psychiatric and Mental Health Nursing, 11(1), 89-98.

Feng, K. (2021). Research on legal protection of personal information of K-12 students in the United States. International and Comparative Education, 43(9), 87-94.

Fung, B. (2017, March 28). The House just voted to wipe away the FCC’s landmark Internet privacy protections. The Washington Post. Retrieved from https://www.washingtonpost.com/news/the-switch/wp/2017/03/28/the-house-just-votedto-wipe-out-the-fccs-landmark-internet-privacy-protections/

Gao, F. (2018). Personal information protection: From individual control to social control. Jurisprudence Research, 40(03), 84-101.

He, L. (2020). Zhengzhou yi gaoxiao jin liang wan ming xuesheng xinxi yi xielou, xiaofang: Gong'an jiguan zheng diaocha [Nearly 20000 students from a university in Zhengzhou are suspected to have leaked information, and the public security organ is investigating]. Retrieved from https://www.thepaper.cn/newsDetail_forward_7746440

Huang, F., & Sun, Q. (2023). Digitization of higher education in the Guangdong-Hong Kong-Macao Greater Bay Area: From the comparative perspective of the international greater Bay Area. Journal of Shenzhen University (Humanities & Social Sciences), 40(1), 17-28.

Huang, X. (2022). Pesonal information protection under artificial intelligence technology: Towards cooperative and multiple governance. Forum on Science and Technology in China, (3), 140-147.

Hui, D. (2022). Empirical analysis of the integration mechanism of explicit and implicit education on the ideological and political education and impact on mental health: The perspective of new media. Frontiers in Public Health, 10. doi:10.3389/fpubh.2022.1010751

Jiang, X., Yang, J., & Dai, Y. (2020). The experience and enlightenment on protecting personal private information in American colleges and universities. Beijing Education, 3, 71-74.

Jin, L. (2021). Logical thinking and realistic view between ruling education by law and ruling school by law. Modern Education Management, (1), 107-112.

Kalaf-Hughes, N. (2023). Promoting information literacy and visual literacy skills in undergraduate students using infographics. PS: Political Science & Politics, 56(2), 321- 327.

Kuner, C., Cate, F. H., Millard, C., Svantesson, D. J. B., & Lynskey, O. (2015). Risk management in data protection. International Data Privacy Law, 5(2), 95-98.

LaBarge, M. C., Walker, K. L., Azzari, C. N., Bourassa, M., Catlin, J., Finkelstein, S., . . . Reshadi, M. (2022). Digital exchange compromises: Teetering priorities of consumers and organizations at the iron triangle. Journal of Consumer Affairs, 56(3), 1220-1243.

Levitan, K. B. (2022). Information resources as “goods” in the life cycle of information production. Journal of the American Society for Information Science, 33(1), 44-54.

Li, B. (2016). Jiaoyu xinxi hua beijing xia de daxue yingyu shizi duiwu jianshe [The construction of college english teaching staff under the background of educational informationization]. Education and Vocation, (17), 73-75.

Li, J., Xiao, W., & Zhang, C. (2023). Data security crisis in universities: Identification of key factors affecting data breach incidents. Humanities and Social Sciences Communications, 10(1), 1-18.

Li, X. (2022). “Yao zhidao” yu “heli qidai”: Duolunduo daxue baohu xuesheng geren xinxi de shijian ji qishi ["Need to Know" and "Reasonable Expectation": The practice and enlightenment of the University of Toronto in protecting student personal information]. China Higher Education Research, (4), 40-43.

Nwagwu, W. E., & Donkor, A. B. (2022). Personal information creation, storage and finding behaviours of faculty in selected universities in Ghana. African Journal of Library, Archives & Information Science, 32(1).

Osei Yeboah-Boateng, E., Osei-Owusu, A., & Henten, A. (2017). Editorial-ICT in Africa. Telecommunications Policy, 41(7-8), 533-536.

Ozor, A., & Toner, J. (2022). Information literacy behavior and practice: An assessment of undergraduate students at Ada College of Education, Ghana. Journal of Library Administration, 62(1), 132-151.

Pouchard, L. (2015). Revisiting the data lifecycle with big data curation. International Journal of Digital Curation, 10(2), 176-192.

Saeed, S. (2023). Education, online presence and cybersecurity implications: A study of information security practices of computing students in Saudi Arabia. Sustainability, 15(12), 9426.

Sapanca, H. F., & Kanbul, S. (2022). Risk management in digitalized educational environments: Teachers’ information security awareness levels. Frontiers in Psychology, 13, 986561.

Shen, Z., & Zhao, S. (2022). Legal instructional design by deep learning theory under the background of educational psychology. Frontiers in Psychology, 13, 917174.

Sun, C., Liu, J. A., Razmerita, L., Xu, Y., & Qi, J. (2022). Higher education to support sustainable development: The influence of information literacy and online learning process on Chinese postgraduates’ innovation performance. Sustainability, 14(13), 7789.

Sun, Y. (2022). Application of probabilistic random matrix management mode in student information management for higher education. Mathematical Problems in Engineering, 2022(1), 9219955.

Suo, C. (2010). Shi lun xinxi shengming zhouqi de gainian ji yanjiu neirong [Remark on the concept and research contents of information lifecycle]. Library and Information Service, 54(13), 5-9.

Tatiana, B., Kobicheva, A., Tokareva, E., & Mokhorov, D. (2022). The relationship between students’ psychological security level, academic engagement and performance variables in the digital educational environment. Education and Information Technologies, 27(7), 9385-9399.

Vijayalakshmi, A., Lin, M. H., & Laczniak, R. N. (2022). Managing children's internet advertising experiences: Parental preferences for regulation. Journal of Consumer Affairs, 52(3), 595-622.

Wade, A. (2014). The children's online privacy protection act: Can website regulations be applied to mobile phone Apps. Federal Courts Law Review, 8, 197.

Walker, K. L., Bodendorf, K., Kiesler, T., de Mattos, G., Rostom, M., & Elkordy, A. (2023). Compulsory technology adoption and adaptation in education: A looming student privacy problem. Journal of Consumer Affairs, 57(1), 445-478.

Wang, H. (2023). Reflection and foresight on personal information protection and optimization in public health emergencies in China—From the perspective of personal information collection during the period of China’s Dynamic-Zero COVID-19 Prevention and Control Policy. International Journal of Environmental Research and Public Health, 20(2), 1290.

Wang, J. (2019). Da shuju shidai xiaoyuan xuesheng geren xinxi de falü baohu yu guizhi [The Legal protection and regulation of personal information of campus students in the era of big data]. China Higher Education, (20), 52-53.

Wang, Z., Yu, X., & Qi, M. (2021). Analysis of the key points of China’s rural education informatization development under the background of “Internet +”. China Educational Technology, (10), 91-97.

Wei, W., Fang, W., & Wei, J. (2021). Research on the innovation of college basketball information teaching mode under the background of Internet. Journal of Physics: Conference Series, 1744(4), 042226.

Williamson, B. (2022). Learning in the ‘platform society’: Disassembling an educational

data assemblage. Research in Education, 98(1), 59-82.

Wing, J. M. (2019). The data life cycle. Harvard Data Science Review, 1(1). doi:10.1162/99608f92.e26845b4

Xiao, J., Teng, H., Wang, H., & Tan, J. (2022). Psychological emotions-based online learning grade prediction via BP neural network. Frontiers in Psychology, 13, 981561.

Yang, Y., & Qu, Y. 2020. Library services boosted by artificial intelligence—Taking Nansha Library of Guangzhou as an example. Library Tribune, 40(12), 137-142.

Ye, J. (2017). The gain and loss of the “Civil Rights” chapter of General Provisions of Civil Law. Peking University Law Journal, 29(3), 645-655.

Yu, S., & Gao, W. (2018). Gaige kaifang yilai woguo jiaoshi chengjie quan de bianqian, kunjing yu chaoyue [The change, dilemmas and transcendence of disciplinary power of teacher in China since Reform and Opening up]. Journal of Shanghai Educational Research, (6), 14-18.

Yu, Z., Qin, S., & Luo, J. (2020). Chongqing yi gaoxiao 800 yu ming xuesheng xinxi bei daoyong, she shi qiye cheng you jiazhang qiequ [More than 800 students in a university in Chongqing have their information stolen, and the enterprises involved claim that their parents have stolen it]. Retrieved from https://www.thepaper.cn/newsDetail_forward_7084747

Zhang, L. (2022). The construction mechanism and realization path of risk specifications for personal information protection. Journal of Jiangxi University of Finance and Economics, (3), 126.

Zhang, T. (2022a). Exploration on path of risk control of personal information protection. Law Science, (6), 57-71.

Zhang, T. (2022b). Paradigm shift of personal information protection in open government data. Modern Law Science, 44(1), 175-186.

Zhang, X. B. (2021). On imposing obligations on the “Gatekeepers” of the ecology of the Internet in the protection of personal information. Journal of Comparative Law, 3, 11-24.

Zheng, X. (2021). The civil law interpretation and protection methods of personal information. Law Science, (3), 116-130.

Zuo, C., & Hu, J. (2021). System dilemma and legislative consideration of educational disciplinary. Contemporary Education Sciences, (7), 37-45.

Downloads

Published

2024-11-14

Issue

Section

Article