Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 15 |
Since 2006 (last 20 years) | 20 |
Descriptor
Electronic Learning | 20 |
Information Security | 20 |
Privacy | 11 |
Internet | 8 |
Computer Security | 6 |
Student Records | 6 |
Distance Education | 5 |
Online Courses | 5 |
Definitions | 4 |
Educational Legislation | 4 |
Educational Policy | 4 |
More ▼ |
Source
Author
Zimmerle, Joanna C. | 2 |
A., Sharmila | 1 |
Alier, Marc | 1 |
Altun, Halis | 1 |
Boninger, Faith | 1 |
Chen, Li-Chiou | 1 |
Francis-Poscente, Krista | 1 |
Frost, Dale | 1 |
Garg, Anuj | 1 |
Gentz, Susan | 1 |
Grajek, Susan | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 20 |
Journal Articles | 16 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Elementary Education | 1 |
Two Year Colleges | 1 |
Audience
Teachers | 2 |
Administrators | 1 |
Parents | 1 |
Policymakers | 1 |
Location
Canada | 2 |
West Virginia | 2 |
Arizona | 1 |
Colorado | 1 |
Connecticut | 1 |
District of Columbia | 1 |
Georgia | 1 |
Idaho | 1 |
Indiana | 1 |
Kentucky | 1 |
Maine | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
No Child Left Behind Act 2001 | 1 |
Race to the Top | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Garg, Anuj; A., Sharmila; Kumar, Pramod; Madhukar, Mani; Loyola-González, Octavio; Kumar, Manoj – Education and Information Technologies, 2022
Nowadays, internet technology plays a vital role in all the fields of our daily lives ranging from the world economy, professional careers, higher education, and almost all the spheres that are deeply impacted. In the current situation, due to COVID-19, the dependence on the Internet for almost everything, including learning, getting daily needs,…
Descriptors: Internet, Electronic Learning, Online Courses, Educational Quality
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
Sarah T. Zipf; Kevin Kinser; Heather A. Turner; Jeffrey C. Sun – Institute for College Access & Success, 2025
Online program managers (OPMs) are third-party companies that work with colleges and universities to develop, launch, and deliver online learning. The prevalence of OPMs, however, has important implications for higher education program quality and transparency. In the final piece of our four-part series, higher education scholars establish a…
Descriptors: Electronic Learning, Higher Education, Distance Education, Information Security
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Yilmaz, Fahri; Çakir, Hasan – Journal of Learning and Teaching in Digital Age, 2021
The purpose of this study is to define learning analytics, to introduce concepts related to learning analytics and to introduce potential study topics related to learning analytics. Today's education model has changed with evolving social and economic conditions over time. This change in education has created such new situations as individualized…
Descriptors: Learning Analytics, Definitions, Educational Change, Individualized Instruction
McDermott, Maureen – Distance Learning, 2018
Twenty-first century higher education instructors are continually tasked to review, align, pilot, adopt, infuse, and evaluate new tools and resources into curricula rich with standards regardless of course format (online/ distance, hybrid, and face-to-face courses). Demands often overwhelm instructors who cannot assume that all students approach…
Descriptors: Electronic Learning, Internet, Privacy, Information Security
Zimmerle, Joanna C. – Computers in the Schools, 2021
In an effort to slow the spread of the highly infectious disease coronavirus (COVID-19), school districts around the world closed school buildings, thrusting educators into emergency remote teaching. Although many vendors were quick to release tutorial guides and free trials for their online learning resources, the growing concern over student…
Descriptors: COVID-19, Pandemics, School Closing, Distance Education
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Jeghal, Adil; Oughdir, Lahcen; Tairi, Hamid – Education and Information Technologies, 2016
The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect…
Descriptors: Privacy, Information Security, Role, Educational Environment
Gupta, Shikha – Journal of Research Practice, 2017
This article presents an overview of internet-based research, highlighting the absence of a standard terminology to define and classify such research. The label internet-based research or online research can cover a diverse range of research designs and methods, involving different degrees of ethical concern regarding privacy, transparency,…
Descriptors: Ethics, Research Design, Design Requirements, Internet
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
National Forum on Education Statistics, 2019
Educators employ different methods of teaching and learning to help their students succeed. One such method is personalized learning, which aims to tailor instruction to the needs, talents, and skills of each individual learner. Rapid advances in technology platforms and digital content over the last decade have enabled more widespread use of…
Descriptors: Individualized Instruction, Data Use, School Districts, Data Collection
Boninger, Faith; Molnar, Alex – National Education Policy Center, 2020
The COVID-19 pandemic has given the entire country a crash course in virtual education and digital education platforms. School leaders have been forced to consider a set of very imperfect options as they struggle to reopen their schools. This three-brief collection identifies key issues for school leaders to consider before adopting a digital…
Descriptors: Educational Technology, Technology Uses in Education, COVID-19, Pandemics
Rickman, Dana – State Education Standard, 2016
By combining an overall vision for the use of data, a commitment to protecting student privacy and data integrity, and supportive legislation, Georgia emerged as a leader in the effective use of student data. But it easily could have gone another way. None of the three elements could be taken for granted when Georgia set out to develop its state…
Descriptors: Student Records, Information Security, Privacy, Educational Legislation
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Previous Page | Next Page »
Pages: 1 | 2