Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 11 |
Since 2006 (last 20 years) | 15 |
Descriptor
Computer Software | 15 |
Data Collection | 15 |
Privacy | 15 |
Higher Education | 8 |
Information Security | 7 |
Data Analysis | 6 |
Information Technology | 5 |
Artificial Intelligence | 4 |
College Students | 4 |
Computer Science Education | 4 |
Educational Technology | 4 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 13 |
Reports - Research | 7 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 2 |
Guides - Classroom - Teacher | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 11 |
Postsecondary Education | 11 |
Elementary Secondary Education | 3 |
Grade 9 | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Teachers | 1 |
Location
Brazil | 2 |
Asia | 1 |
Australia | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Vetter, Matthew A.; McDowell, Zachary J. – Journal of University Teaching and Learning Practice, 2023
COVID-19 and the public health policies emerging in response have laid bare a multiplicity of issues related to educational access and knowledge equity on a global scale. Among these, the quick shift to online and hybrid education models led teachers to adapt a plethora of digital platforms to deliver content and sponsor interactions). Such…
Descriptors: Equal Education, Epistemology, Educational Technology, Technology Uses in Education
Chinsook, Kittipong; Khajonmote, Withamon; Klintawon, Sununta; Sakulthai, Chaiyan; Leamsakul, Wicha; Jantakoon, Thada – Higher Education Studies, 2022
Big data is an important part of innovation that has recently attracted a lot of interest from academics and practitioners alike. Given the importance of the education industry, there is a growing trend to investigate the role of big data in this field. Much research has been undertaken to date in order to better understand the use of big data in…
Descriptors: Student Behavior, Learning Analytics, Computer Software, Rating Scales
Dalal, Amy Csizmar; Oliver, Emily – Journal of Higher Education Outreach and Engagement, 2022
We present a case study of a multi-year, academic civic engagement (ACE) collaboration in a computer science capstone course. ACE projects in computer science provide an avenue for students to apply software development concepts to real-world projects with actual clients, and can offer meaningful engagement with ethical issues. The typical…
Descriptors: Case Studies, Computer Science Education, Capstone Experiences, Outcomes of Education
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Zhang, Zhiyong; Zhang, Danyang – Grantee Submission, 2021
Data science has maintained its popularity for about 20 years. This study adopts a bottom-up approach to understand what data science is by analyzing the descriptions of courses offered by the data science programs in the United States. Through topic modeling, 14 topics are identified from the current curricula of 56 data science programs. These…
Descriptors: Statistics Education, Definitions, Course Descriptions, Computer Science Education
Hope, Andrew – Education and Society, 2018
Recently there has been a growth in the surveillance of students' online activities. This has been facilitated not only by the increasing numbers of digital devices, but also through surveillance creep (Marx, 1998). Drawing upon this concept and associated ideas, including data creep, policy creep and concept creep, this paper explores the digital…
Descriptors: Telecommunications, Observation, Data Collection, Computer Software
Larson, Eric C.; Vieregger, Carl – Journal of Information Systems Education, 2019
This teaching case highlights the complex and unique strategic issues facing social media platform companies, using Facebook as the primary, motivating example. The case centers on the breach of trust that occurred when Cambridge Analytica acquired user data from 87 million Facebook accounts and then attempted to sway the 2016 U.S. Presidential…
Descriptors: Social Media, Strategic Planning, Trust (Psychology), Users (Information)
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Hamilton, Clovia; Swart, William; Stokes, Gerald M. – Online Submission, 2021
We address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence, the ongoing research in Artificial Cognitive Assistants, and the explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri, spurred on by…
Descriptors: Rating Scales, Ethics, Compliance (Legal), Artificial Intelligence
Lindh, Maria; Nolin, Jan – European Educational Research Journal, 2016
The aim of this study is to show how Google's business model is concealed within Google Apps for Education (GAFE) as well as how such a bundle is perceived within one educational organisation, consisting of approximately 30 schools. The study consists of two parts: 1) a rhetorical analysis of Google policy documents and 2) an interview study in a…
Descriptors: Privacy, Data Collection, Information Sources, Program Implementation
Pence, Harry E. – Journal of Educational Technology Systems, 2014
Big Data Analytics is a topic fraught with both positive and negative potential. Big Data is defined not just by the amount of information involved but also its variety and complexity, as well as the speed with which it must be analyzed or delivered. The amount of data being produced is already incredibly great, and current developments suggest…
Descriptors: Data Analysis, Data Collection, Privacy, Definitions
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Rafferty, Anna N., Ed.; Whitehill, Jacob, Ed.; Romero, Cristobal, Ed.; Cavalli-Sforza, Violetta, Ed. – International Educational Data Mining Society, 2020
The 13th iteration of the International Conference on Educational Data Mining (EDM 2020) was originally arranged to take place in Ifrane, Morocco. Due to the SARS-CoV-2 (coronavirus) epidemic, EDM 2020, as well as most other academic conferences in 2020, had to be changed to a purely online format. To facilitate efficient transmission of…
Descriptors: Educational Improvement, Teaching Methods, Information Retrieval, Data Processing
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers