NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mohammed Airaj – Education and Information Technologies, 2024
This paper proposes a human-centered approach to using Artificial Intelligence (AI) in higher education that promotes equitable access to knowledge while preserving privacy and ethics. Through the lens of third-generation Activity Theory we examine the interaction between three activity systems in higher education: AI teachers, human teachers, and…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Higher Education
Privacy Technical Assistance Center, 2016
In February 2014, the Privacy Technical Assistance Center (PTAC) issued guidance titled "Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices." This Model Terms of Service document is intended to further assist schools and school districts in implementing that guidance. In a traditional…
Descriptors: Privacy, Student Records, Contracts, Educational Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Carlon, Sarah; Carter, Mark; Stephenson, Jennifer – Australasian Journal of Special Education, 2017
A pilot study of the effectiveness of guided access to websites that provide information on intervention options for children with autism spectrum disorder (ASD) was conducted with 12 parents of preschool aged children with ASD. Guided access to reliable websites that included information about the effcacy of interventions for ASD (Raising…
Descriptors: Pilot Projects, Web Sites, Early Intervention, Decision Making
Foundation for Excellence in Education (ExcelinEd), 2016
Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…
Descriptors: Student Records, Information Security, Privacy, Information Utilization