Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Networks | 3 |
Disclosure | 3 |
Privacy | 3 |
Access to Information | 2 |
Confidential Records | 2 |
Data Collection | 2 |
Databases | 2 |
Ethics | 2 |
Information Dissemination | 2 |
Automation | 1 |
Civil Liberties | 1 |
More ▼ |
Author
Bell, Kevin R. | 1 |
Luzeckyj, Ann | 1 |
Rubin, Michael Rogers | 1 |
Searle, Bill | 1 |
Toohey, Danny | 1 |
Vanderlelie, Jessica | 1 |
West, Deborah | 1 |
Publication Type
Journal Articles | 2 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Australia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes

Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1993
This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…
Descriptors: Access to Information, Automation, Computer Networks, Confidential Records