NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Researchers1
Laws, Policies, & Programs
Assessments and Surveys
International Adult Literacy…1
What Works Clearinghouse Rating
Showing 1 to 15 of 30 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
John Y. H. Bai; Olaf Zawacki-Richter; Wolfgang Muskens – Turkish Online Journal of Distance Education, 2024
Artificial intelligence in education (AIEd) is a fast-growing field of research. In previous work, we described efforts to explore the possible futures of AIEd by identifying key variables and their future prospects. This paper re-examines our discussions on the governance of data and the role of students and teachers by considering the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Natural Language Processing, Governance
Peer reviewed Peer reviewed
Direct linkDirect link
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Leo Van Audenhove; Lotte Vermeire; Wendy Van den Broeck; Andy Demeulenaere – Information and Learning Sciences, 2024
Purpose: The purpose of this paper is to analyse data literacy in the new Digital Competence Framework for Citizens (DigComp 2.2). Mid-2022 the Joint Research Centre of the European Commission published a new version of the DigComp (EC, 2022). This new version focusses more on the datafication of society and emerging technologies, such as…
Descriptors: Data Analysis, Data Collection, Information Literacy, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Vallée, Etienne; Hsu, Yu-Chang – TechTrends: Linking Research and Practice to Improve Learning, 2023
The adoption by the African Union of its Convention on Cyber Security and Personal Data Protection in 2014 represented a step forward to protect personal data and to ensure that data remain private and secure. This is especially important for students, who often have no autonomy in the educational technology they use. Students cannot choose why…
Descriptors: Privacy, Information Security, Data Collection, Student Records
Christian Beighton – Sage Research Methods Cases, 2021
This case discusses how scenario-based interviews can be used to develop research into policy and practice. Based on data collected from U.K. further education management settings, it shows how and why scenario-based interviews were used. It also explains how the data collected were then used to illustrate and analyze the implementation of a…
Descriptors: Foreign Countries, Interviews, Vignettes, Policy Formation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Gilman Ranogajec, Mirna; Badurina, Boris – Education for Information, 2021
In today's Information society it is an everyday scenario to be a part of an online community such as social media. Participation has become almost mandatory to the point of acting as a virtual extremity to one's physical environment. This virtual extremity is the individual's window to the outside world and vice versa. The process of being a part…
Descriptors: Confidence Testing, Social Media, Information Security, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Abrantes, Bruno F.; Venkataraman, Anuradha – International Journal of Learning and Change, 2022
Strategy theory recognises outer general environmental mutations in the legal landscape as compelling dynamic forces of business competition. Thus, the latest EU directive on data protection constitutes an uncharted event for testing organisational adaptability. This research aims to understand the impact of GDPR and the endeavours towards the…
Descriptors: Foreign Countries, Content Analysis, Generalization, Business Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Annie Irvine – International Journal of Social Research Methodology, 2024
Engaging with primary researchers during qualitative secondary analysis is a practice much recommended but rarely written about. In this article, I reflect on my experience of crossing an imagined boundary between the discrete textual dataset and its creators, of acknowledging and engaging with those researchers who invested in constructing the…
Descriptors: Researchers, Foreign Countries, Primary Sources, Research Methodology
British Columbia Council on Admissions and Transfer, 2021
This report focuses on data governance at post-secondary institutions and related organizations. Data governance is defined as the formal execution and enforcement of authority over the management of data and data-related assets (Seiner, 2014). An overview of data governance at higher education institutions provides detail on elements of data…
Descriptors: Foreign Countries, Data, Governance, Postsecondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Pangrazio, Luci; Selwyn, Neil – Pedagogy, Culture and Society, 2021
The ongoing 'datafication' of contemporary society has a number of implications for schools and schooling. One is the increasing calls for schools to help develop young people's understandings about the role that digital data now plays in their everyday lives -- especially in terms of the 'data economy' and 'surveillance capitalism'. Reporting on…
Descriptors: Data Collection, Data Analysis, Technology Uses in Education, Data Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Amiraullt, Ray J. – Quarterly Review of Distance Education, 2019
The educational setting has been the backdrop for numerous debates as far back as recorded history. Today's educational setting, however, contains technological elements so advanced that they by their very nature bring with them a series of highly significant implications which educators have never before been required to address. These issues…
Descriptors: Educational Technology, Technology Uses in Education, Ownership, Privacy
Previous Page | Next Page »
Pages: 1  |  2