Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 14 |
Since 2006 (last 20 years) | 26 |
Descriptor
Computer Software | 48 |
Student Records | 48 |
Higher Education | 22 |
Elementary Secondary Education | 11 |
College Students | 10 |
Educational Technology | 8 |
Databases | 7 |
Foreign Countries | 7 |
Privacy | 7 |
Data Analysis | 6 |
Data Collection | 6 |
More ▼ |
Source
Author
Allison, Colin | 1 |
Barbour, Andrew | 1 |
Beverly, Donald | 1 |
Bickers, Doyle | 1 |
Brown, James M. | 1 |
Brown, Jana | 1 |
Capo, Berta | 1 |
Cherkaoui, Chihab | 1 |
Chinsook, Kittipong | 1 |
Corn, Michael | 1 |
Cox, Kevin | 1 |
More ▼ |
Publication Type
Journal Articles | 48 |
Reports - Descriptive | 24 |
Reports - Evaluative | 9 |
Reports - Research | 8 |
Guides - Non-Classroom | 4 |
Opinion Papers | 3 |
Tests/Questionnaires | 3 |
Guides - Classroom - Teacher | 2 |
Information Analyses | 1 |
Education Level
Location
New York | 2 |
Alabama | 1 |
Australia | 1 |
California (San Jose) | 1 |
Connecticut | 1 |
Illinois | 1 |
Japan | 1 |
Kansas | 1 |
Morocco | 1 |
Philippines | 1 |
Tennessee (Nashville) | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Tafesse, Wondwesen – International Journal of Educational Technology in Higher Education, 2022
With the widespread adoption of social networking sites among college students, discerning the relationship between social networking sites use and college students' academic performance has become a major research endeavor. However, much of the available research in this area rely on student self-reports and findings are notably inconsistent.…
Descriptors: Social Networks, College Students, Computer Software, Academic Achievement
Chinsook, Kittipong; Khajonmote, Withamon; Klintawon, Sununta; Sakulthai, Chaiyan; Leamsakul, Wicha; Jantakoon, Thada – Higher Education Studies, 2022
Big data is an important part of innovation that has recently attracted a lot of interest from academics and practitioners alike. Given the importance of the education industry, there is a growing trend to investigate the role of big data in this field. Much research has been undertaken to date in order to better understand the use of big data in…
Descriptors: Student Behavior, Learning Analytics, Computer Software, Rating Scales
Olipas, Cris Norman P. – Online Submission, 2020
This study aimed to design and develop a Student Information and Violation Management System (SIVMS) for a Higher Educational Institution in Central Luzon, Philippines. It utilized the descriptive developmental design of research in which the researcher described and explained the processes performed to design and develop the prototype system. The…
Descriptors: Information Systems, Design, Higher Education, Foreign Countries
Kisling, Reid; Peterson, Andrew; Nisbet, Robert – Strategic Enrollment Management Quarterly, 2021
Data analytics is undergoing an evolution through effective data use to support both operational and learning analytics models. However, this evolution will require that institutional leaders transform their data systems to best support the needs of application modeling and use their intuition to help drive the development of better analytical…
Descriptors: Higher Education, Learning Analytics, Models, Instructional Leadership
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
Wang, Ling – Journal of Educational Multimedia and Hypermedia, 2021
Running records is an important reading assessment for diagnosing early readers' needs in diverse instructional settings across grade levels. This study develops an innovative app to help teachers administer running records assessment and investigates teachers' perceptions of its functionality and usability in practical classrooms. The app offers…
Descriptors: Miscue Analysis, Reading Comprehension, Reading Tests, Computer Software
Rodafinos, Angelos – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Aim/Purpose: This paper presents some of the issues that academia faces in both the detection of plagiarism and the aftermath. The focus is on the latter, how academics and educational institutions around the world can address the challenges that "follow" the identification of an incident. The scope is to identify the need for and…
Descriptors: Plagiarism, Intervention, Prevention, Higher Education
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Qazdar, Aimad; Er-Raha, Brahim; Cherkaoui, Chihab; Mammass, Driss – Education and Information Technologies, 2019
The use of machine learning with educational data mining (EDM) to predict learner performance has always been an important research area. Predicting academic results is one of the solutions that aims to monitor the progress of students and anticipates students at risk of failing the academic pathways. In this paper, we present a framework for…
Descriptors: Data Analysis, Academic Achievement, At Risk Students, High School Students
Jones, Kyle M. L.; McCoy, Chase – Learning, Media and Technology, 2019
In this article, we argue that the contributions of documentation studies can provide a useful framework for analyzing the datafication of students due to emerging learning analytics (LA) practices. Specifically, the concepts of individuals being 'made into' data and how that data is 'considered as' can help to frame vital questions concerning the…
Descriptors: Data Analysis, Documentation, Guidelines, Data Collection
Henry, Philip – College and University, 2019
Phillip Henry is a semi-retired former U.K. Registrar and Secretary with almost 40 years' experience in higher education. He has been active in staff development in the United Kingdom (Association of University Administrators, Academic Registrars Council, and Association of Heads of University Administration), in the United States (AACRAO and a…
Descriptors: Academic Achievement, Administrator Attitudes, Educational Experience, College Students
O'Brien, Jason; Roller, Sarah; Lampley, Sandra – Journal of Cases in Educational Leadership, 2017
This case focuses on the potential problems associated with sharing personally identifiable information (PII) when students are required to use third-party software. Specifically, third-grade students were required to complete "LearningPad" activities as a component of their homework grade in math, spelling, and language arts. As…
Descriptors: Shared Resources and Services, Privacy, Computer Software, Grade 3
Tebbs, Trevor J. – Roeper Review, 2014
The author--artist, scientist, educator, and visual-spatial thinker--describes the genesis of, and provides insight into, an innovative, strength-based, visually dynamic computer-aided communication system called Chandelier©. This system is the powerful combination of a sophisticated, user-friendly software program and an organizational…
Descriptors: Computer Mediated Communication, Computer Software, Profiles, Holistic Approach