Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Data Analysis | 3 |
Data Collection | 3 |
Ethics | 3 |
Privacy | 3 |
Educational Research | 2 |
Beliefs | 1 |
Civil Liberties | 1 |
College Faculty | 1 |
College Students | 1 |
Computer Networks | 1 |
Confidential Records | 1 |
More ▼ |
Author
Johri, Aditya | 1 |
Klein, Carrie | 1 |
Lester, Jaime | 1 |
Rangwala, Huzefa | 1 |
Rubin, Michael Rogers | 1 |
Wang, Yinying | 1 |
Publication Type
Journal Articles | 3 |
Collected Works - Serial | 1 |
Information Analyses | 1 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Audience
Practitioners | 3 |
Researchers | 2 |
Media Staff | 1 |
Policymakers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wang, Yinying – TechTrends: Linking Research and Practice to Improve Learning, 2016
Against the backdrop of the ever-increasing influx of big data, this article examines the opportunities and concerns over big data in education. Specifically, this article first introduces big data, followed by delineating the potential opportunities of using big data in education in two areas: learning analytics and educational policy. Then, the…
Descriptors: Educational Research, Data Collection, Data Analysis, Educational Policy
Lester, Jaime; Klein, Carrie; Rangwala, Huzefa; Johri, Aditya – ASHE Higher Education Report, 2017
The purpose of this monograph is to give readers a practical and theoretical foundation in learning analytics in higher education, including an understanding of the challenges and incentives that are present in the institution, in the individual, and in the technologies themselves. Among questions that are explored and answered are: (1) What are…
Descriptors: Educational Research, Data Collection, Data Analysis, Higher Education

Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)