Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 8 |
Descriptor
Higher Education | 11 |
Information Utilization | 11 |
Privacy | 11 |
Data Collection | 6 |
Student Records | 6 |
Educational Legislation | 4 |
Ethics | 4 |
Information Security | 4 |
Accountability | 3 |
Data Analysis | 3 |
Information Needs | 3 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 8 |
Postsecondary Education | 8 |
Elementary Secondary Education | 1 |
Audience
Location
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Higher Education Act 1965 | 2 |
Pell Grant Program | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Privacy Technical Assistance Center, 2017
The Privacy Technical Assistance Center (PTAC) has received an increasing number of questions from postsecondary educational institutions (institutions) on the conditions under which federal student financial aid information may be used for program evaluation and research purposes. Numerous federal laws govern access to, disclosure of, and use of…
Descriptors: Student Financial Aid, Information Utilization, College Students, Program Evaluation
Reidenberg, Joel R.; Schaub, Florian – Theory and Research in Education, 2018
Education, Big Data, and student privacy are a combustible mix. The improvement of education and the protection of student privacy are key societal values. Big Data and Learning Analytics offer the promise of unlocking insights to improving education through large-scale empirical analysis of data generated from student information and student…
Descriptors: Data Collection, Information Security, Student Records, Privacy
Orphan, Cecilia M.; Laderman, Sophia; Gildersleeve, Ryan Evely – Review of Higher Education, 2021
This multiple-site case study of 24 intermediary organizations (IOs) engaged in postsecondary public policy examined how they identify policy issues and move issues, problems, and solutions onto the higher education policy agenda. Specifically, this study used agenda-setting theory to examine how IOs construct higher education policy issues,…
Descriptors: Case Studies, Agenda Setting, Educational Policy, Policy Analysis
Dennen, Vanessa P. – Quarterly Review of Distance Education, 2016
Digital learning environments are spaces in which data are shared, generated, and recorded. At the end of an online course, a rich collection of digital artifacts are left behind by the instructor and learners. Some artifacts are intentionally created learning materials and assignments, some are the products of class interaction in discussion…
Descriptors: Access to Information, Online Courses, Computer Mediated Communication, Electronic Learning
Prinsloo, Paul; Slade, Sharon – Journal of Learning Analytics, 2016
In light of increasing concerns about surveillance, higher education institutions (HEIs) cannot afford a simple paternalistic approach to student data. Very few HEIs have regulatory frameworks in place and/or share information with students regarding the scope of data that may be collected, analyzed, used, and shared. It is clear from literature…
Descriptors: Data Collection, Data Analysis, Educational Research, Information Security
Pence, Harry E. – Journal of Educational Technology Systems, 2014
Big Data Analytics is a topic fraught with both positive and negative potential. Big Data is defined not just by the amount of information involved but also its variety and complexity, as well as the speed with which it must be analyzed or delivered. The amount of data being produced is already incredibly great, and current developments suggest…
Descriptors: Data Analysis, Data Collection, Privacy, Definitions
Whitfield, Christina; Armstrong, John; Weeden, Dustin – State Higher Education Executive Officers, 2019
Since 2010, the State Higher Education Executive Officers Association (SHEEO) has periodically administered the "Strong Foundations" survey, which documents the content, structure, and effective use of state postsecondary student unit record systems (PSURSs). This report highlights the results of the fourth administration of the survey,…
Descriptors: Postsecondary Education, Information Systems, Student Records, Data Collection
Armstrong, John; Whitfield, Christina – State Higher Education Executive Officers, 2016
This report addresses two key questions about postsecondary student unit record data systems (PSURSs): (1) What data are collected by various parties; and (2) how do these entities use the data to inform policy decisions? This 2016 report is both a follow-up and a redesign of two previous "Strong Foundations" reports by SHEEO (2010 and…
Descriptors: Postsecondary Education, Information Systems, Student Records, Data Collection

Resta, Paul E. – Machine-Mediated Learning, 1994
Discusses the ethical use of computer-mediated communication (CMC) and the lack of integration of information ethics into elementary, secondary, and higher education curricula. The development of information ethics instruction is proposed which would include such topics as intellectual property, destruction of digital property, confidentiality and…
Descriptors: Behavior Standards, Computer Literacy, Computer Mediated Communication, Curriculum Development

Hernandez-Avila, Ines – American Indian Quarterly, 1996
Introduces a personalized woman-centered Native perspective on the study and ethical representation of Native American spirituality and ceremonial activities. Discusses the importance of respect for intimate spiritual practices and concern for the consequences of disclosure and public consumption. Contains references in notes. (SV)
Descriptors: American Indian Culture, American Indian Studies, American Indians, Cultural Maintenance
Davis, Gary – Association for Institutional Research, 1981
Ways that higher education institutions can improve their compliance procedures in responding to external requests for reports and information are addressed. Institutional officers must first determine how the data will be used by the external agency. By questioning how the requested information will be used, a determination can be made of what…
Descriptors: Accountability, Compliance (Legal), Confidential Records, Cost Effectiveness