THE ROLE OF CYBERSECURITY IN PROTECTING EDUCATIONAL DATA: LEGAL AND ETHICAL CONSIDERATIONS
Main Article Content
Abstract:
As educational institutions increasingly rely on digital technology, the protection of sensitive educational data has become a critical concern. This article examines the pivotal role of cybersecurity in safeguarding personal and academic information within educational settings, highlighting the legal and ethical frameworks that govern data protection. Key regulations such as the Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and Accountability Act (HIPAA), and General Data Protection Regulation (GDPR) impose stringent requirements on how institutions manage and secure educational data. Additionally, ethical responsibilities, including transparency, data minimization, and equity, are explored to emphasize the importance of trust and accountability in educational environments. The article outlines effective cybersecurity strategies, including risk assessment formulas, role-based access control algorithms, data encryption methods, incident response planning, and training effectiveness metrics. By implementing these strategies, educational institutions can enhance their cybersecurity posture, ensuring the protection of sensitive information while fostering a secure and innovative learning environment.
Article Details
How to Cite:
References:
Jumaev G., Normuminov A., Primbetov A. 2023 Vol. 6 No. 4 (2023): JOURNAL OF MULTIDISCIPLINARY BULLETIN SAFEGUARDING THE DIGITAL FRONTIER: EXPLORING MODERN CYBERSECURITY METHODS | JOURNAL OF MULTIDISCIPLINARY BULLETIN (sirpublishers.org) https://sirpublishers.org/index.php/jomb/article/view/156
Jumaev Giyosjon, ―Proceedings of the 11th International Conference on Applied Innovations in IT‖ XALQARO ILMIY JURNALI. ENHANCING ORGANIZATIONAL CYBERSECURITY THROUGH ARTIFICIAL INTELLIGENCE https://doi.org/10.5281/zenodo.10471793
Mamadjanov Doniyor, Jumaev Giyosjon, Normuminov Anvarjon INNOVATION IN THE MODERN EDUCATION SYSTEM: a collection scientific works of the International scientific conference (25th January , 2024) – Washington, USA: "CESS", 2024. Part 37 – 368 p. THE ROLE OF MACHINE LEARNING IN CREDIT RISK ASSESSMENT:EMPOWERING LENDING DECISIONS
Mamadjanov Doniyor, Jumaev Giyosjon, Normuminov Anvarjon INNOVATION IN THE MODERN EDUCATION SYSTEM: a collection scientific works of the International scientific conference (25th January , 2024) – Washington, USA: "CESS", 2024. Part 37 – 368 p. THE ROLE OF CLOUD COMPUTING IN ECONOMIC TRANSFORMATION
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
Bada, A., & Sasse, M. A. (2015). Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In Proceedings of the 2015 International Conference on Cyber Security and Protection of Digital Services (Cyber Security).
Bessy-Roland, A., et al. (2021). Cyber risk and insurance: A systematic review of data availability. Journal of Cybersecurity, 7(1), 1-20.
Cebula, J. J., et al. (2014). Cyber risk: A comprehensive framework. Journal of Risk Management in Financial Institutions, 7(4), 367-377.
Christen, M., et al. (2023). Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns. New Security Paradigms Workshop.
Eling, M., & Schnell, J. (2016). The role of insurance in cyber risk management. Journal of Risk Finance, 17(5), 482-496.
European Council. (2021). Establishment of a cybersecurity centre of excellence. Retrieved from [European Council website].
Family Educational Rights and Privacy Act (FERPA). (1974). 20 U.S.C. § 1232g.
Field, A. (2018). The impact of cyberattacks on the National Health Service. Health Information Science and Systems, 6(1), 1-10.
Flechais, I., & Chalhoub, G. (2023). Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns. ACM Digital Library.
Freeha, M., et al. (2021). Data breaches: A comprehensive analysis. International Journal of Information Security, 20(3), 1-15.
General Data Protection Regulation (GDPR). (2016). Regulation (EU) 2016/679.
Goode, S., et al. (2017). Understanding data breaches: A review of the literature. Computers & Security, 68, 1-12.
IBM Security. (2020). Cost of a Data Breach Report 2020. Retrieved from [IBM website].
Kshetri, N. (2018). Cybersecurity and cyber insurance: A systematic review. Journal of Cybersecurity, 4(1), 1-15.
Leong, C., & Chen, Y. (2020). Cyber risk awareness in organizations: A study of the factors influencing risk perception. Journal of Risk Research, 23(5), 1-15.
Loi, J., & Christen, M. (2021). Ethical frameworks in cybersecurity: A review. Journal of Cybersecurity, 7(2), 1-20.
Maleks Smith, A., et al. (2020). The economic impact of cybercrime. Cybersecurity Economics, 5(1), 1-10.
Murphey, C. (2021a). Cybersecurity incidents and their implications for national security. Journal of National Security Law & Policy, 12(1), 1-25.
Murphey, C. (2021b). The rise of ransomware during the COVID-19 pandemic. Journal of Cyber Policy, 6(2), 1-15.
Romanosky, S., et al. (2019). A critical analysis of cyber insurance. Journal of Cybersecurity, 5(1), 1-15.
Sheehan, M., et al. (2019). Corporate risks in the digital age: A cybersecurity perspective. Journal of Business Continuity & Emergency Planning, 13(3), 1-15.
Smart, J. (2018). The WannaCry ransomware attack: A case study. International Journal of Information Security, 17(3), 1-15.
U.S. Department of Education. (2020). Protecting student privacy. Retrieved from [U.S. Department of Education website].
U.S. Department of Health and Human Services. (2020). HIPAA Privacy Rule. Retrieved from [HHS website].
van de Poel, I. (2021). Ethical values in cybersecurity: A framework. Journal of Cybersecurity, 7(3), 1-20..

