NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 161 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
John Y. H. Bai; Olaf Zawacki-Richter; Wolfgang Muskens – Turkish Online Journal of Distance Education, 2024
Artificial intelligence in education (AIEd) is a fast-growing field of research. In previous work, we described efforts to explore the possible futures of AIEd by identifying key variables and their future prospects. This paper re-examines our discussions on the governance of data and the role of students and teachers by considering the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Natural Language Processing, Governance
Peer reviewed Peer reviewed
Direct linkDirect link
Eric Yang; Cheryl Beil – New Directions for Higher Education, 2024
Artificial intelligence (AI) and machine learning (ML) have transformed the landscape of data management in higher education institutions, necessitating a critical evaluation of existing data privacy policies and practices. This research delves into the inadequacies of current frameworks in adapting to the swift evolution of Big Data. Student,…
Descriptors: Artificial Intelligence, Teacher Attitudes, Student Attitudes, College Students
Data Quality Campaign, 2023
People need access to data. Individual students and job seekers, families, educators, communities, and policymakers must have the information they need to foster successful journeys through education and the workforce. Robust statewide longitudinal data systems (SLDSs) can be designed to prioritize meaningful access to data but must also protect…
Descriptors: Federal Government, Government Role, Data, Information Security
Michael Klein; Zac Chase, Contributor – Office of Educational Technology, US Department of Education, 2023
This is the third in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Privacy
Claus von Zastrow; Zeke Perez – Education Commission of the States, 2022
Advances in state education data systems are helping schools understand and meet the needs of learners from early education through college and the workforce. Each state has adhered to key principles for protecting student data privacy. In the report "Lessons in Data Privacy for Education Leaders. Policy Guide," (ED625423) leading…
Descriptors: Privacy, Data, Information Security, State Departments of Education
Privacy Technical Assistance Center, 2021
This resource aims to provide parents of K-12 students information to help understand what it means when your school has a data breach, as well as provide tools and best practices to help navigate the sometimes confusing process of protecting your children's data in the event of a breach.
Descriptors: Student Records, Information Security, Prevention, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Vallée, Etienne; Hsu, Yu-Chang – TechTrends: Linking Research and Practice to Improve Learning, 2023
The adoption by the African Union of its Convention on Cyber Security and Personal Data Protection in 2014 represented a step forward to protect personal data and to ensure that data remain private and secure. This is especially important for students, who often have no autonomy in the educational technology they use. Students cannot choose why…
Descriptors: Privacy, Information Security, Data Collection, Student Records
Peer reviewed Peer reviewed
Direct linkDirect link
Blackmon, Stephanie J. – Change: The Magazine of Higher Learning, 2023
Student privacy is a critical area of higher education that deserves greater focus, particularly as student data digitalization increases. Many colleges and universities use data literacy as a way to prepare students, sometimes from different disciplines, to work with others' data postgraduation. Data literacy can be an avenue for helping all…
Descriptors: Privacy, Data Collection, Data Use, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Kumar, Priya C.; Byrne, Virginia L. – Information and Learning Sciences, 2022
Purpose: Existing privacy-related educational materials are not situated in privacy theory, making it hard to understand what specifically children learn about privacy. This article aims to offer learning objectives and guidance grounded in theories of privacy and learning to serve as a foundation for privacy literacy efforts.…
Descriptors: Privacy, Information Literacy, Information Security, Literacy Education
State Educational Technology Directors Association, 2022
Many districts struggle to access the cybersecurity expertise or other resources needed to secure their networks and data appropriately. This isn't because mitigation strategies don't exist. Often, the barrage of suggestions and warnings directed at school IT leaders are too overwhelming to navigate, are not properly scoped for educational…
Descriptors: Computer Security, Information Security, Privacy, Elementary Secondary Education
Attai, Linnette – Educational Leadership, 2019
With the growth of tech-driven instructional possibilities, school systems have an increasingly urgent responsibility for schools to continuously assess and improve student data-protection practices. Attai, a project director for the Consortium for School Networking, outlines a program designed to help education leaders master the fundamentals of…
Descriptors: Privacy, Information Security, Administrator Responsibility, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Daire Maria Ni Uanachain; Lila Ibrahim Aouad – Thresholds in Education, 2025
This chapter investigates the dual role of Generative AI (GenAI) in providing support and feedback to students and in reshaping formative and summative educational assessments, addressing both the burgeoning opportunities for enhancing teaching methodologies and the associated ethical challenges. There is a focus on the necessity for balanced…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Teaching Methods
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11