NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 1 to 15 of 58 results Save | Export
Erika Huffman – ACT Education Corp., 2025
Student data is an invaluable asset for driving educational success, yet it comes with significant responsibility. As states explore ways to enhance data privacy protections, they must strike a balance between safeguarding sensitive information and leveraging data for student success. This brief examines the best practices in student data privacy…
Descriptors: Data, Privacy, Best Practices, Testing
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paula Cristina R. Azevedo; Christine B. Valadez – Impacting Education: Journal on Transforming Professional Practice, 2025
Artificial Intelligence (AI) has seen a significant rise in public use since the release of ChatGPT in November of 2022. Higher education institutions (HEI) have struggled to negotiate how best to manage AI technologies within their academic communities, acknowledging both positive and negative impacts of AI on education. Focused primarily on…
Descriptors: Higher Education, Artificial Intelligence, Technology Uses in Education, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Annette Bamberger; Tien-Yin Huang – Journal of Education Policy, 2025
This paper analyses the EU's approach to international research cooperation between 2012-2022 drawing on critical geopolitical perspectives and the spatial politics of (re)bordering. It identifies two periods which represent the EU's shifting approaches to international research cooperation from the pursuit of a liberal agenda promoting…
Descriptors: Foreign Countries, Neoliberalism, International Cooperation, Research Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Jenay Robert – EDUCAUSE, 2024
Increasingly, data collection and analysis are core functions of higher education institutions. However, an EDUCAUSE QuickPoll revealed that just one in four (25%) of respondents believed the structure of data functions at their institution was ideal for their analytics needs, and only 16% of respondents indicated that their institutional data…
Descriptors: Higher Education, Learning Analytics, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Whyte, Christopher – Journal of Political Science Education, 2021
This essay outlines a set of mini-games designed to more effectively allow political science instructors, particularly in International Relations, teach basic principles and concepts associated with digital insecurity and cyber conflict. This topic, increasingly significant in IR syllabi in recent years, is in many cases considered with…
Descriptors: Game Based Learning, Political Science, Information Security, Active Learning
Ezeugo, Ernest; Klein, Carrie; Whitfield, Christina – State Higher Education Executive Officers, 2021
State postsecondary data systems contain a wealth of information--including detailed records about individuals--that allow states to analyze and improve their postsecondary education systems. The entities that maintain these systems operate in a context of concern about the privacy and security of educational records. They have both an interest in…
Descriptors: Privacy, Information Security, Information Systems, Postsecondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lisseth Sanchez; Jefferson Penarreta; Xavier Soria Poma – Discover Education, 2024
The learning management system (LMS) is a software based on SAAS, internet navigator, or user application, which manage the teaching and learning of an academic or non-academic program. This work presents a comparison of 45 LMSs. The objective of this research is to report a study of the LMS developed for higher education. This objective is…
Descriptors: Learning Management Systems, Influence of Technology, Computer Software Evaluation, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lionel Mew; William H. Money – Information Systems Education Journal, 2024
Since it was released on November 30, 2022, ChatGPT has offered numerous opportunities for higher education professors to improve their course offerings. However, not all information provided by the application is accurate. The application has been known to yield highly inaccurate information with high confidence. Yet, with that knowledge, ChatGPT…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Library Research
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Renata Kochut; Thomas Brady – International Society for Technology, Education, and Science, 2024
This paper examines the Individualized Credit for Prior Learning (CPL) process in business education. It highlights its role in accrediting students' experiential learning and bridging practical experience with academic credit. This research then recommends solutions that include AI tools, advisor training, and centralized resource hubs. Most…
Descriptors: Business Education, Artificial Intelligence, Technology Uses in Education, Credits
Copa, Nancy; Campbell, Jim; Roberson, Amanda Janice – Institute for Higher Education Policy, 2022
As support continues to grow across the country and across the political spectrum for the federal student-level data network (SLDN) proposed in the College Transparency Act (CTA), IHEP partnered with AEM Education Services, with input from RTI International, to further build out a roadmap to support the implementation of the SLDN. "Frameworks…
Descriptors: Information Networks, College Students, Data Collection, Data Use
Peer reviewed Peer reviewed
Direct linkDirect link
Komljenovic, Janja – Higher Education: The International Journal of Higher Education Research, 2022
Universities around the world are increasingly digitalising all of their operations, with the current COVID-19 pandemic speeding up otherwise steady developments. This article focuses on the political economy of higher education (HE) digitalisation and suggests a new research programme. I foreground three principal arguments, which are…
Descriptors: Media Adaptation, COVID-19, Pandemics, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Marcus; Walsh, Patrick – Journal of Higher Education Policy and Management, 2023
This article critically considers these recent developments and political context, proposing an approach to manage sensitive research in the complex contemporary political environment. The first part of the article defines security-sensitive research as research having risk associated with foreign interference, cybersecurity, biosecurity or…
Descriptors: Foreign Countries, Research, Higher Education, Confidentiality
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4