NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…6
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rory McGreal – International Journal of E-Learning & Distance Education, 2023
Micro-credentials can provide easily accessible and transparent evidence of skills or knowledge that have been certified by an authority, based on small units of learning. The recognition and transfer of credits is becoming essential, as an increasing number of students are studying at different institutions, often at the same time, online or in…
Descriptors: Microcredentials, Information Storage, Databases, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lisseth Sanchez; Jefferson Penarreta; Xavier Soria Poma – Discover Education, 2024
The learning management system (LMS) is a software based on SAAS, internet navigator, or user application, which manage the teaching and learning of an academic or non-academic program. This work presents a comparison of 45 LMSs. The objective of this research is to report a study of the LMS developed for higher education. This objective is…
Descriptors: Learning Management Systems, Influence of Technology, Computer Software Evaluation, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ranieri, V.; Stynes, H.; Kennedy, E. – Research Ethics, 2021
The Confidentiality Advisory Group (CAG) is a specialised body that advises the Health Research Authority (HRA) and the Secretary of State for Health on requests for access to confidential information, in the absence of informed consent from its owners. Its primary role is to oversee the safe use of such information and to counsel the governing…
Descriptors: Foreign Countries, Advisory Committees, Confidentiality, Access to Information
Privacy Technical Assistance Center, 2020
The Student Privacy Policy Office (SPPO) is performing a four-year review of a sample of the websites of 1,504 local education agencies (LEAs) to identify whether and how these websites include information about student privacy. In each year of the study, SPPO is reviewing a nationally representative sample of 376 LEA websites, focusing on whether…
Descriptors: Privacy, School Districts, Web Sites, Educational Legislation
Privacy Technical Assistance Center, 2020
The U.S. Department of Education's (Department's or ED's) Student Privacy Policy Office (SPPO) and its Privacy Technical Assistance Center (PTAC) are conducting a four-year review of the websites of 1,504 Local Education Agencies (LEAs) to identify whether and how these websites include information on student privacy. The review is part of ED's…
Descriptors: Privacy, Student Records, Information Security, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Power, Kerry – E-Learning and Digital Media, 2019
When conceptualising knowledge gained from tapping into an internet data pool, one may question many things which can include the role of the researcher and the researched, privacy and ethics, intention, authenticity and the vastness of scope. The researcher, regardless of research intention including moral or ethical positions, must acknowledge…
Descriptors: Ethics, Research Problems, Social Media, Researchers
Vance, Amelia – National Association of State Boards of Education, 2018
In this policy update, author Amelia Vance explores data protections for school directory information. She argues students do not have the right to attend school anonymously, but they do have a right to have their information protected and used responsibly by local and state education agencies. State boards can lead on this issue by striking the…
Descriptors: Privacy, Information Security, Access to Information, Student Records
Best, Katharina Ley; Pane, John F. – RAND Corporation, 2018
The expansion of education technology is transforming the learning environment in classrooms, schools, school systems, online, and at home. The rise of education technology brings with it an increased opportunity for the collection and application of data, which are valuable resources for educators, schools, policymakers, researchers, and software…
Descriptors: Educational Technology, Technology Uses in Education, Privacy, Information Storage
Stickland, Rachael – Network for Public Education, 2019
In 1974, Congress passed legislation known as the "Family Educational Rights and Privacy Act" or FERPA, in response to "the growing evidence of the abuse of student records across the nation." The law was written to protect the confidentiality of information held in a student's records. With the introduction of technology in…
Descriptors: Privacy, Information Security, Student Rights, Parent Rights
Peer reviewed Peer reviewed
Direct linkDirect link
Gagliardi, Jonathan; Parnell, Amelia; Carpenter-Hubin, Julie – Change: The Magazine of Higher Learning, 2018
Over the last two years, more data was created than in the entire previous history of humankind (IBM, 2016; Marr, 2016). Roughly 1.7 megabytes of new information will be created every second for every person on earth by the turn of the decade (Evans, 2011; Gantz & Reinsel, 2012; Marr, 2016). Data are created continuously and at a rate that is…
Descriptors: Data Collection, Data Analysis, Higher Education, Decision Making
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Perry, Angela – Project on Student Debt, 2019
California has long been a national and global leader in developing and maintaining quality higher education options, as well as in providing financial aid and consumer protections for Californians who access that education. However, although California's colleges and the state government do collect, receive, and report a great deal of data, these…
Descriptors: Education Work Relationship, Access to Information, Wages, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Criollo-C., Santiago; Luján-Mora, Sergio – International Association for Development of the Information Society, 2018
In current education there is a trend called bring your own devices (BYOD), this refers to the policy of use of resources that allows students to bring their own mobile device to use in the classroom. BYOD allows students and educators to take advantage of technological tools to improve learning and instruction. Mobile devices in a BYOD…
Descriptors: Electronic Learning, Handheld Devices, Technology Uses in Education, Educational Trends
McShane, Ian; Dearman, Philip – Australian Association for Research in Education, 2016
This paper examines the rise and fall of the Victorian education department's learning management system Ultranet. The Ultranet was conceived as a web-based portal that was designed to integrate and deliver on a range of policy objectives in the areas of student management, school networking and communication, and teaching and learning. Heavily…
Descriptors: Foreign Countries, Educational Technology, Computer Software, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Andrew Hope – Discourse: Studies in the Cultural Politics of Education, 2015
The introduction of widespread school Internet access in industrialised countries has been accompanied by the materialisation of what can be labelled as a national school e-safety agenda. Drawing upon Foucault's notions of discourse and governmentality, this paper explores how e-safety policy documents serve to constrain the conceptual…
Descriptors: Policy Analysis, Information Policy, Information Security, Social Control
Previous Page | Next Page »
Pages: 1  |  2