NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 29 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Callanan, Gerard A.; Perri, David F.; Tomkowicz, Sandra M. – Journal of Education for Business, 2018
The authors present a pedagogical primer on the highly controversial business strategies of data mining and automated prediction. They provide a summary that allows business professors and students the opportunity to better understand the privacy and ethical issues that arise from high-tech, Internet-based organizations implementing programs to…
Descriptors: Automation, Prediction, Discussion (Teaching Technique), Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Jones, Kyle M. L.; Salo, Dorothea – College & Research Libraries, 2018
In this paper, the authors address learning analytics and the ways academic libraries are beginning to participate in wider institutional learning analytics initiatives. Since there are moral issues associated with learning analytics, the authors consider how data mining practices run counter to ethical principles in the American Library…
Descriptors: Academic Libraries, Ethics, Intellectual Freedom, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hildebrandt, Mireille – Journal of Learning Analytics, 2017
This article is a revised version of the keynote presented at LAK '16 in Edinburgh. The article investigates some of the assumptions of learning analytics, notably those related to behaviourism. Building on the work of Ivan Pavlov, Herbert Simon, and James Gibson as ways of "learning as a machine," the article then develops two levels of…
Descriptors: Behaviorism, Data Processing, Profiles, Learning Processes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Johri, Aditya; Yang, Seungwon; Vorvoreanu, Mihaela; Madhavan, Krishna – Advances in Engineering Education, 2016
As part of our NSF funded collaborative project on Data Sharing within Engineering Education Community, we conducted an empirical study to better understand the current climate of data sharing and participants' future expectations of the field. We present findings of this mixed method study and discuss implications. Overall, we found strong…
Descriptors: Engineering Education, Data, Knowledge Management, Educational Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Rhodes, Marjorie; Rizzo, Michael T.; Foster-Hanson, Emily; Moty, Kelsey; Leshin, Rachel A.; Wang, Michelle; Benitez, Josie; Ocampo, John Daryl – Journal of Cognition and Development, 2020
This article introduces an accessible approach to implementing unmoderated remote research in developmental science -- research in which children and families participate in studies remotely and independently, without directly interacting with researchers. Unmoderated remote research has the potential to strengthen developmental science by: (1)…
Descriptors: Research, Cognitive Development, Children, Family (Sociological Unit)
Data Quality Campaign, 2014
District and state data systems are constructed to ensure that individuals can access only the data that are appropriate for their role. Still, questions from the public about how these data systems work and how student privacy is protected have been increasing. A recurring concern is the feared existence of a "permanent record"--a…
Descriptors: Data Collection, Student Records, Data Processing, Access to Information
Sabourin, Jennifer; Kosturko, Lucy; FitzGerald, Clare; McQuiggan, Scott – International Educational Data Mining Society, 2015
While the field of educational data mining (EDM) has generated many innovations for improving educational software and student learning, the mining of student data has recently come under a great deal of scrutiny. Many stakeholder groups, including public officials, media outlets, and parents, have voiced concern over the privacy of student data…
Descriptors: Privacy, Student Records, Data Processing, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rafferty, Anna N., Ed.; Whitehill, Jacob, Ed.; Romero, Cristobal, Ed.; Cavalli-Sforza, Violetta, Ed. – International Educational Data Mining Society, 2020
The 13th iteration of the International Conference on Educational Data Mining (EDM 2020) was originally arranged to take place in Ifrane, Morocco. Due to the SARS-CoV-2 (coronavirus) epidemic, EDM 2020, as well as most other academic conferences in 2020, had to be changed to a purely online format. To facilitate efficient transmission of…
Descriptors: Educational Improvement, Teaching Methods, Information Retrieval, Data Processing
Guo, Ling – ProQuest LLC, 2010
The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…
Descriptors: Privacy, Data, Data Analysis, Internet
Wu, Yuehua – ProQuest LLC, 2010
The development and diffusion of information and communication technologies, particularly the internet, creates a worldwide trend of using ICTs and the internet to deliver public services. This new form of electronic administration--e-government--potentially offers great benefits to society in that it can enhance public service efficiency,…
Descriptors: Foreign Countries, Governance, Information Dissemination, Telecommunications
Peer reviewed Peer reviewed
Liew, Chong K.; And Others – Journal of the American Society for Information Science, 1985
Introduces two data distortion methods (Frequency-Imposed Distortion, Frequency-Imposed Probability Distortion) and uses a Monte Carlo study to compare their performance with that of other distortion methods (Point Distortion, Probability Distortion). Indications that data generated by these two methods produce accurate statistics and protect…
Descriptors: College Faculty, Comparative Analysis, Data Processing, Monte Carlo Methods
Cullen, Mike – 1975
In the face of more sophisticated data collection technology, California voters have demonstrated an increasing concern about their own privacy. In response, Assemblyman Cullen has proposed a bill to the state legislature which would require anyone opening an automated information system to send notice to the Secretary of State. This notice would…
Descriptors: Confidentiality, Data Collection, Data Processing, Information Processing
Computer and Business Equipment Manufacturers Association, Washington, DC. – 1979
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
Descriptors: Bibliographies, Computers, Data Processing, Information Systems
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1981
A general introduction to computer based national information systems, and the context and basis for future studies are provided in this report. Chapter One, the introduction, summarizes computers and information systems and their relation to society, the structure of information policy issues, and public policy issues. Chapter Two describes the…
Descriptors: Administration, Computer Science, Computers, Data Processing
Previous Page | Next Page ยป
Pages: 1  |  2