NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 151 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Monica Tatasciore; Luke Strickland; Shayne Loft – Cognitive Research: Principles and Implications, 2024
Increased automation transparency can improve the accuracy of automation use but can lead to increased bias towards agreeing with advice. Information about the automation's confidence in its advice may also increase the predictability of automation errors. We examined the effects of providing automation transparency, automation confidence…
Descriptors: Automation, Access to Information, Information Technology, Bias
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Silva-Robles, Rigoberto; Dutton-Treviño, Harold Sidney – Teaching Public Administration, 2023
The purpose of this work is to provide empirical evidence as to how state level Freedom of Information or Access to Information and data protection regulator bodies in Mexico carry out their training tasks. We use different theoretical assumptions, particularly those that refer to the idea of "training in the public sector" regarding two…
Descriptors: Foreign Countries, Access to Information, Information Security, Public Administration Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rory McGreal – International Journal of E-Learning & Distance Education, 2023
Micro-credentials can provide easily accessible and transparent evidence of skills or knowledge that have been certified by an authority, based on small units of learning. The recognition and transfer of credits is becoming essential, as an increasing number of students are studying at different institutions, often at the same time, online or in…
Descriptors: Microcredentials, Information Storage, Databases, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Laura Czerniewicz; Jennifer Feldman – Learning, Media and Technology, 2024
The pressure towards digital education is felt everywhere including in places with extreme digital divides. Resource-constrained educational environments are particularly threatened by datification manifest in the dominant business models of surveillance capitalism as there is less room in such contexts to refuse the 'free' offerings from big tech…
Descriptors: Foreign Countries, Teaching Methods, Teacher Attitudes, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Mark Anthony Camilleri – Interactive Technology and Smart Education, 2024
Purpose: Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Cost Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Celedonia, Karen L.; Valenti, Michael W.; Corrales Compagnucci, Marcelo; Lowery Wilson, Michael – Research Ethics, 2021
Community-based mental health care providers (CBMHCPs) are increasingly contacted by external researchers for research study recruitment. Unfortunately, many do not possess the resources or personnel with the skills required to successfully evaluate research proposals for risks. Providing access to clients and client health information can result…
Descriptors: Ethics, Legal Problems, Health Personnel, Recruitment
Peer reviewed Peer reviewed
Direct linkDirect link
Abbott, Heather – College and University, 2022
Granting access to student information, for what purpose, and to whom, is rarely a simple decision. Academic records have long been critical to the functioning of a university, but leveraging institutional data has become increasingly important (Lester, et al. 2017). Data stewards in higher education institutions nationwide confront a…
Descriptors: Data, Access to Information, Student Records, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Chander, Romesh; Dhar, Meghna; Bhatt, Ketan – Journal of Access Services, 2022
With the rising cases of theft, vandalism, mutilation, infiltration, and other fraudulent practices at academic libraries, the matter of library security has become a matter of greater concern for modern-day library professionals as well as scholars in the field of library and information science. Considering the seriousness of the issue, the…
Descriptors: Bibliometrics, Academic Libraries, Information Security, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Lisseth Sanchez; Jefferson Penarreta; Xavier Soria Poma – Discover Education, 2024
The learning management system (LMS) is a software based on SAAS, internet navigator, or user application, which manage the teaching and learning of an academic or non-academic program. This work presents a comparison of 45 LMSs. The objective of this research is to report a study of the LMS developed for higher education. This objective is…
Descriptors: Learning Management Systems, Influence of Technology, Computer Software Evaluation, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ranieri, V.; Stynes, H.; Kennedy, E. – Research Ethics, 2021
The Confidentiality Advisory Group (CAG) is a specialised body that advises the Health Research Authority (HRA) and the Secretary of State for Health on requests for access to confidential information, in the absence of informed consent from its owners. Its primary role is to oversee the safe use of such information and to counsel the governing…
Descriptors: Foreign Countries, Advisory Committees, Confidentiality, Access to Information
Privacy Technical Assistance Center, 2022
The Student Privacy Policy Office (SPPO) at the U.S. Department of Education (Department) performed a four-year review of a nationally representative sample of the websites of 1,504 local education agencies (LEAs) to identify whether and how these websites include information about student privacy. In each year of the study, SPPO reviewed a…
Descriptors: Educational Legislation, Privacy, Student Records, Parent Rights
Peer reviewed Peer reviewed
Direct linkDirect link
Patrick Ocheja; Brendan Flanagan; Hiroaki Ogata; Solomon Sunday Oyelere – Interactive Learning Environments, 2023
The use of blockchain in education has become one of the trending topics in education technology research. However, only a handful of education blockchain solutions have provided a measure of the impact on students' learning outcomes, teaching, or administrative processes. This work reviews how academic data stored on the blockchain is being…
Descriptors: Educational Technology, Learning Activities, Lifelong Learning, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Mohammed Airaj – Education and Information Technologies, 2024
This paper proposes a human-centered approach to using Artificial Intelligence (AI) in higher education that promotes equitable access to knowledge while preserving privacy and ethics. Through the lens of third-generation Activity Theory we examine the interaction between three activity systems in higher education: AI teachers, human teachers, and…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Higher Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11