NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Marcia Jean Ham – ProQuest LLC, 2021
Leveraging big data for student data analytics is increasingly integrated throughout university operations from admissions to advising to teaching and learning. Though the possibilities are exciting to consider, they are not without risks to student autonomy, privacy, equity, and educational value. There has been little research showing how…
Descriptors: Educational Policy, Personal Autonomy, Privacy, Equal Education
Bonomi, Luca – ProQuest LLC, 2015
The Big Data phenomenon is posing new challenges in our modern society. In addition to requiring information systems to effectively manage high-dimensional and complex data, the privacy and social implications associated with the data collection, data analytics, and service requirements create new important research problems. First, the high…
Descriptors: Data, Privacy, Information Security, Data Analysis
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
LaMacchia, Carolyn – ProQuest LLC, 2013
Technological advances have led to the generation of large databases of organizational data recognized as an information-rich, strategic asset for internal analysis and sharing with trading partners. Data mining techniques can discover patterns in large databases including relationships considered strategically relevant to the owner of the data.…
Descriptors: Data Analysis, Privacy, Heuristics, Problem Solving
Pervaiz, Zahid – ProQuest LLC, 2013
Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…
Descriptors: Data Analysis, Privacy, Accuracy, Information Security
Alnatsheh, Rami – ProQuest LLC, 2012
A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…
Descriptors: Data Collection, Data Analysis, Evaluation Methods, Mathematics
Sonwalkar, Mukul Dinkar – ProQuest LLC, 2012
This dissertation addresses the use and modeling of spatio-temporal data for the purposes of providing applications for location based services. One of the major issues in dealing with spatio-temporal data for location based services is the availability and sparseness of such data. Other than the hardware costs associated with collecting movement…
Descriptors: Data Analysis, Geographic Location, Geographic Information Systems, Privacy
Amos, Kimberly S. – ProQuest LLC, 2013
In recent years, nursing faculty incivility has been a searing topic of research. Nursing research included studies on incivility among nursing students, incivility between nursing students and nursing faculty, and incivility in the clinical setting. However, literature specifically on nursing faculty incivility was limited. This descriptive,…
Descriptors: Nursing Education, Nurses, College Faculty, Teacher Behavior
Guo, Ling – ProQuest LLC, 2010
The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…
Descriptors: Privacy, Data, Data Analysis, Internet
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis