Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer System Design | 4 |
Data | 4 |
Higher Education | 4 |
Computer Uses in Education | 2 |
Data Analysis | 2 |
Educational Trends | 2 |
Information Technology | 2 |
Internet | 2 |
Privacy | 2 |
Technology Planning | 2 |
Barriers | 1 |
More ▼ |
Author
Bennett, Cedric | 1 |
Drachsler, Hendrik | 1 |
Greller, Wolfgang | 1 |
Hacker, Thomas J. | 1 |
O'Reilly, Una-May | 1 |
Veeramachaneni, Kalyan | 1 |
Wheeler, Bradley C. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Location
Indiana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
O'Reilly, Una-May; Veeramachaneni, Kalyan – Research & Practice in Assessment, 2014
Because MOOCs bring big data to the forefront, they confront learning science with technology challenges. We describe an agenda for developing technology that enables MOOC analytics. Such an agenda needs to efficiently address the detailed, low level, high volume nature of MOOC data. It also needs to help exploit the data's capacity to reveal, in…
Descriptors: Data, Technology Uses in Education, Online Courses, Open Education
Greller, Wolfgang; Drachsler, Hendrik – Educational Technology & Society, 2012
With the increase in available educational data, it is expected that Learning Analytics will become a powerful means to inform and support learners, teachers and their institutions in better understanding and predicting personal learning needs and performance. However, the processes and requirements behind the beneficial application of Learning…
Descriptors: Foreign Countries, Computer Uses in Education, Ethics, Best Practices
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration