NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)2
Since 2006 (last 20 years)6
Audience
Researchers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Beckmann, Elizabeth A.; Mahanty, Sango – Australasian Journal of Educational Technology, 2016
This paper presents selected findings from a 5-year design-based research case study of the evolution of an online role play that allows postgraduate students to explore the complexities inherent in land rights negotiations between indigenous peoples and others. In the context of Laurillard's (2002) conversational framework and a design-based…
Descriptors: Foreign Countries, Graduate Students, Role Playing, Integrated Learning Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Scott, Karen M.; Nerminathan, Arany; Alexander, Shirley; Phelps, Megan; Harrison, Amanda – British Journal of Educational Technology, 2017
This study was conducted with medical students, physicians, patients and carers in a paediatric and an adult hospital to determine use of mobile devices for learning, and beliefs and attitudes about others' use. Awareness of ethical, patient privacy and data security concerns was explored. The research was conducted using a mixed-methods…
Descriptors: Handheld Devices, Technology Uses in Education, Medical Education, Medical Students
Peer reviewed Peer reviewed
Direct linkDirect link
Davis, Katie; James, Carrie – Learning, Media and Technology, 2013
There is considerable debate about young people's concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of…
Descriptors: Privacy, Early Adolescents, Middle School Students, Preadolescents
Adebiaye, Richmond – ProQuest LLC, 2010
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
Descriptors: Computer Mediated Communication, Electronic Mail, Privacy, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
McKee, Heidi; Porter, James E. – College Composition and Communication, 2008
The study of writers and writing in digital environments raises distinct and complex ethical issues for researchers. Rhetoric theory and casuistic ethics, working in tandem, provide a theoretical framework for addressing such issues. A casuistic heuristic grounded in rhetorical principles can help digital writing researchers critically…
Descriptors: Writing (Composition), Computer Mediated Communication, Electronic Publishing, Computer Uses in Education
Geroy, Gary D.; Jankovich, Jackie L. – Performance and Instruction, 1996
Discusses the issue of e-mail and employee privacy rights. Highlights include laws and proposed legislation, ethical dilemmas, task and nontask messages and organizational misconduct, and policy guidelines for decision making about e-mail monitoring. (AEF)
Descriptors: Computer Mediated Communication, Confidentiality, Decision Making, Disclosure
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers