NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mark Anthony Camilleri – Interactive Technology and Smart Education, 2024
Purpose: Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Cost Effectiveness
The White House, 2022
Among the great challenges posed to democracy today is the use of technology, data, and automated systems in ways that threaten the rights of the American public. Too often, these tools are used to limit our opportunities and prevent our access to critical resources or services. These problems are well documented. In America and around the world,…
Descriptors: Artificial Intelligence, Algorithms, Privacy, Information Security
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Lin, Van-Kim; Crowne, Sarah – Early Childhood Data Collaborative, 2020
Home visiting programs typically collect sensitive information about family characteristics, risk factors, and services received. States may choose to integrate these data with other early childhood data to learn more about the reach and effectiveness of the services and supports that families receive. As more states begin to integrate data across…
Descriptors: Home Visits, Privacy, Information Security, Data Collection
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Moradi Sheykhjan, Tohid – Online Submission, 2017
Our goal for this paper discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in relation to its application for educating digital citizens. In recent years we have witnessed a revolution in Information and Communication Technologies (ICTs) that has transformed every field of…
Descriptors: Internet, Online Searching, Educational Research, Social Science Research
Graafland, Julie Hooft – OECD Publishing, 2018
This paper provides a synthesis of the literature on and recent trends in new technologies and its effect on 21st century children (0-18 years old). It begins by providing an overview of recent trends in the access and use of new technologies as well as a summary of online opportunities and risks. It then explores a variety of factors, including…
Descriptors: Technology Uses in Education, Technological Advancement, Web 2.0 Technologies, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Andrew Hope – Discourse: Studies in the Cultural Politics of Education, 2015
The introduction of widespread school Internet access in industrialised countries has been accompanied by the materialisation of what can be labelled as a national school e-safety agenda. Drawing upon Foucault's notions of discourse and governmentality, this paper explores how e-safety policy documents serve to constrain the conceptual…
Descriptors: Policy Analysis, Information Policy, Information Security, Social Control
Peer reviewed Peer reviewed
Direct linkDirect link
Scott, Karen M.; Nerminathan, Arany; Alexander, Shirley; Phelps, Megan; Harrison, Amanda – British Journal of Educational Technology, 2017
This study was conducted with medical students, physicians, patients and carers in a paediatric and an adult hospital to determine use of mobile devices for learning, and beliefs and attitudes about others' use. Awareness of ethical, patient privacy and data security concerns was explored. The research was conducted using a mixed-methods…
Descriptors: Handheld Devices, Technology Uses in Education, Medical Education, Medical Students
Wills, Lisa M. – New England Journal of Higher Education, 2011
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
Descriptors: Higher Education, Risk Management, Risk, Access to Information
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology