NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Researchers1
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 25 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
M. Claire Buchan; Jasmin Bhawra; Tarun Reddy Katapally – Smart Learning Environments, 2024
The rapid expansion of digital connectivity has provided youth with wide-ranging access to digital platforms for communication, entertainment, and education. In light of this profound shift, there have been growing concerns about online safety, data privacy, and cybersecurity. A critical factor influencing the ability of youth to responsibly…
Descriptors: Digital Literacy, Program Implementation, Measures (Individuals), Foreign Countries
Christopher H. Clark, Editor; Cathryn van Kessel, Editor – Teachers College Press, 2025
Whether skeptical or enthusiastic about AI, every social studies educator will find something useful for their practice in this book. The introduction of widely available generative AI tools has caused a frenzy of both positive and negative reactions. Between utopian visions and apocalyptic predictions of AI's impact on education, there is a need…
Descriptors: Social Studies, Artificial Intelligence, Technology Uses in Education, Computer Software
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Opesade, Adeola O.; Adesina, Omolayo A. – Journal of Cybersecurity Education, Research and Practice, 2020
The use of the Internet among children and adolescents is now a norm in many parts of the world. As the Internet offers a wide range of benefits to these ones, so does it expose them to possible various risks and harm. Researchers in different countries across the world have engaged in the production of relevant research-based knowledge in order…
Descriptors: Internet, Computer Security, Information Security, Children
Amna Khaliq – ProQuest LLC, 2023
This doctoral project centers on Canadian business leaders' phenomenological online education expansion by navigating the challenges faced by strategic leaders concerning the expansion of online education in the Canadian higher education sector from a business perspective. The study identifies the problems and opportunities of faculty members'…
Descriptors: Foreign Countries, Educational Development, Electronic Learning, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Christian Metaxas; Terry Greene; Jessica Malcolm; Njoki Muriithi; Esther Schacter; Mollie Schnurr – OTESSA Journal, 2024
As we enter a new age of technological innovation and subsequent educational instrumentation change, there is increasing demand for innovative methods that encourage student learning experiences in virtual, online spaces. ePortfolios and e-book projects are designed and owned by students and are centered within the student's learning. They provide…
Descriptors: Electronic Publishing, Educational Change, Books, Portfolios (Background Materials)
Peer reviewed Peer reviewed
Direct linkDirect link
Maurel, Dominique; Zwarich, Natasha – Education for Information, 2021
Information governance provides a framework of accountability for the effective and efficient use of information to meet organizational objectives and compliance requirements. While information functions are often carried out by separate units that frequently work in silos, information governance is based on an interactive approach, taking into…
Descriptors: Governance, Accountability, Information Management, Power Structure
British Columbia Council on Admissions and Transfer, 2021
This report focuses on data governance at post-secondary institutions and related organizations. Data governance is defined as the formal execution and enforcement of authority over the management of data and data-related assets (Seiner, 2014). An overview of data governance at higher education institutions provides detail on elements of data…
Descriptors: Foreign Countries, Data, Governance, Postsecondary Education
Kilgore, Wendy – American Association of Collegiate Registrars and Admissions Officers (AACRAO), 2021
The academic credentialing landscape is rapidly evolving. Institutions of higher education must meet this critical moment in the evolution of how learning is delivered, assessed, and recognized. While some educational institutions have shifted to issuing Electronic Data Exchange (EDX), digitally signed PDFs or blockchain verifiable credentials,…
Descriptors: Credentials, Higher Education, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Adorjan, Michael; Ricciardelli, Rosemary – Learning, Media and Technology, 2019
While previous research identifies skepticism and some animosity among students towards school-based cyber-safety programs, drawing from focus group discussions with Canadian teens, this paper contributes to unpacking reasons for both support for 'what works' and antagonism for what is perceived to be lacking. Our findings reveal support for…
Descriptors: Information Security, Computer Security, Criticism, High School Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Babin, Ron; Halilovic, Branka – Information Systems Education Journal, 2017
The use of cloud computing services has grown dramatically in post-secondary institutions in the last decade. In particular, universities have been attracted to the low-cost and flexibility of acquiring cloud software services from Google, Microsoft and others, to implement e-mail, calendar and document management and other basic office software.…
Descriptors: Internet, Computer Software, Information Management, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Snow, Kathy – Journal of Educational Multimedia and Hypermedia, 2017
This paper presents a discussion around the question of data protection, privacy, liability and the resultant policy that has developed both in public K-12 education and post secondary education in Canada. With no central regulation of online protection in Canada educators in some provinces face a digital divide caused by more restrictive policy…
Descriptors: Foreign Countries, Social Media, Field Trips, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gupta, Shikha – Journal of Research Practice, 2017
This article presents an overview of internet-based research, highlighting the absence of a standard terminology to define and classify such research. The label internet-based research or online research can cover a diverse range of research designs and methods, involving different degrees of ethical concern regarding privacy, transparency,…
Descriptors: Ethics, Research Design, Design Requirements, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zaza, Christine; McKenzie, Amanda – Canadian Journal for the Scholarship of Teaching and Learning, 2018
While the text-matching tool, Turnitin®, has traditionally been used to deter and detect plagiarism, more recently, instructors have started to use this tool for formative self-assessment. To describe Turnitin®'s use in practice and to explore perceptions of this tool, we surveyed 940 students, teaching assistants, and instructors at a Canadian…
Descriptors: Computer Software, Plagiarism, College Students, Formative Evaluation
Previous Page | Next Page »
Pages: 1  |  2