NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pinky Kusuma Ningtyas; Hayuni Retno Widarti; Parlan Parlan – Journal of Science Learning, 2024
Social media is one of the platforms that is popular and familiar to various circles. This technology has penetrated multiple fields, especially education. Many studies have shown the use of social media in the learning process. This study aims to explore the use of social media in science learning environments and their impacts. The method used…
Descriptors: Social Media, Science Education, Learning Processes, Research Reports
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mengkorn Pum; Sarin Sok – Asian Journal of Distance Education, 2024
With current state-of-the-art advances in artificial intelligence (AI), especially large language models, such as Google's Gemini, Microsoft's Copilot, and ChatGPT, among others, a plethora of research on this phenomenon has been conducted worldwide aiming to examine its limitations, benefits and ethical implications. Nonetheless, such a…
Descriptors: Foreign Countries, Artificial Intelligence, Technology Uses in Education, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christopher Dignam; Candace M. Smith; Amy L. Kelly – Journal of Education in Science, Environment and Health, 2025
The evolution of artificial intelligence (AI) and robotics in education has transitioned from automation toward emotionally responsive learning systems through artificial emotional intelligence (AEI). While AI-driven robotics has enhanced instructional automation, AEI introduces an affective dimension by recognizing and responding to human…
Descriptors: Robotics, Artificial Intelligence, Teaching Methods, Computer Software
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Office of Educational Technology, US Department of Education, 2024
The U.S. Department of Education is committed to supporting innovative advances in educational technology to improve teaching and learning across the nation's education systems and to support educators as they incorporate emerging technology into their learning communities. Artificial Intelligence (AI) in education is a complex and rapidly…
Descriptors: Equal Education, Artificial Intelligence, Computer Software, Technology Integration
Hamilton, Clovia; Swart, William; Stokes, Gerald M. – Online Submission, 2021
We address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence, the ongoing research in Artificial Cognitive Assistants, and the explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri, spurred on by…
Descriptors: Rating Scales, Ethics, Compliance (Legal), Artificial Intelligence
Council of the Great City Schools, 2017
Equipping today's children with 21st century skills for the digital age requires turning traditional classrooms into a digital-learning ecosystem and ensuring teachers have professional skills and unfettered access to tools they need for 21st century teaching and learning. School district networks are being used for instruction, business, and…
Descriptors: Information Security, Educational Technology, Information Management, Networks
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Bienkowski, Marie; Gerard, Sarah Nixon; Rubin, Shawn; Sanford, Cathy; Borrelli-Murray, Dana; Driscoll, Tom; Arora, Jessie; Hruska, Mike; Beck, Katie; Murray, Thomas; Hoekstra, Jason; Gannes, Stuart; Metz, Edward; Midgley, Steve; Castilla, Stephanie; Tomassini, Jason; Madda, Mary Jo; Chase, Zac; Martin, Erik; Noel, Marcus; Styles, Kathleen – Office of Educational Technology, US Department of Education, 2015
Opportunities abound for software designers and developers to create impactful tools for teachers, school leaders, students, and their families. This guide for developers, startups, and entrepreneurs addresses key questions about the education ecosystem and highlights critical needs and opportunities to develop digital tools and apps for learning.…
Descriptors: Computer Software, Design, Technology Uses in Education, Educational Technology
Bienkowski, Marie; Feng, Mingyu; Means, Barbara – Office of Educational Technology, US Department of Education, 2012
As more of commerce, entertainment, communication, and learning are occurring over the Web, the amount of data online activities generate is skyrocketing. Commercial entities have led the way in developing techniques for harvesting insights from this mass of data for use in identifying likely consumers of their products, in refining their products…
Descriptors: Teaching Methods, Learning Processes, Data Analysis, Barriers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rafferty, Anna N., Ed.; Whitehill, Jacob, Ed.; Romero, Cristobal, Ed.; Cavalli-Sforza, Violetta, Ed. – International Educational Data Mining Society, 2020
The 13th iteration of the International Conference on Educational Data Mining (EDM 2020) was originally arranged to take place in Ifrane, Morocco. Due to the SARS-CoV-2 (coronavirus) epidemic, EDM 2020, as well as most other academic conferences in 2020, had to be changed to a purely online format. To facilitate efficient transmission of…
Descriptors: Educational Improvement, Teaching Methods, Information Retrieval, Data Processing
Van Horn, Royal – Phi Delta Kappan, 2000
Peeping software takes several forms and can be used on a network or to monitor a certain computer. E-Mail Plus, for example, hides inside a computer and sends exact copies of incoming or outgoing e-mail anywhere. School staff with monitored computers should demand e-mail privacy. (MLH)
Descriptors: Computer Software, Electronic Mail, Elementary Secondary Education, Internet
Previous Page | Next Page ยป
Pages: 1  |  2