NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Charlotte Z. Mann; Adam C. Sales; Johann A. Gagnon-Bartsch – Grantee Submission, 2025
Combining observational and experimental data for causal inference can improve treatment effect estimation. However, many observational data sets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. Nonetheless, a small amount of risk of disclosing sensitive…
Descriptors: Causal Models, Statistical Analysis, Privacy, Risk
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Samantha Fu; Charles Davis; Jesse Rothstein; Aparna Ramesh; Evan White – Grantee Submission, 2022
Linking data together can be a powerful way for governments and researchers alike to tackle vexing public policy research problems. However, for researchers, finding ways to link data directly between two departments can often be more challenging than even obtaining the data in the first place. Even when a researcher develops the necessary…
Descriptors: Data Use, Research Methodology, Researchers, Privacy
Renu Balyan; Danielle S. McNamara; Scott A. Crossley; William Brown; Andrew J. Karter; Dean Schillinger – Grantee Submission, 2022
Online patient portals that facilitate communication between patient and provider can improve patients' medication adherence and health outcomes. The effectiveness of such web-based communication measures can be influenced by the health literacy (HL) of a patient. In the context of diabetes, low HL is associated with severe hypoglycemia and high…
Descriptors: Computational Linguistics, Patients, Physicians, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bosch, Nigel; Crues, R. Wes; Shaik, Najmuddin; Paquette, Luc – Grantee Submission, 2020
Online courses often include discussion forums, which provide a rich source of data to better understand and improve students' learning experiences. However, forum messages frequently contain private information that prevents researchers from analyzing these data. We present a method for discovering and redacting private information including…
Descriptors: Privacy, Discussion Groups, Asynchronous Communication, Methods
Zhang, Zhiyong; Zhang, Danyang – Grantee Submission, 2021
Data science has maintained its popularity for about 20 years. This study adopts a bottom-up approach to understand what data science is by analyzing the descriptions of courses offered by the data science programs in the United States. Through topic modeling, 14 topics are identified from the current curricula of 56 data science programs. These…
Descriptors: Statistics Education, Definitions, Course Descriptions, Computer Science Education
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Wang, Jianjun – Grantee Submission, 2013
On September 22, 2012, NSF announced its decision to fund a three-year project, "Models for Information Assurance Education and Outreach" (MIAEO). In the first year of grant operation, MIAEO has invited 18 high school students, two K-12 teachers, and two CSUB student assistants to conduct research explorations in the fields of…
Descriptors: Information Security, Computer Science Education, Improvement Programs, Program Effectiveness