NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vallée, Etienne; Hsu, Yu-Chang – TechTrends: Linking Research and Practice to Improve Learning, 2023
The adoption by the African Union of its Convention on Cyber Security and Personal Data Protection in 2014 represented a step forward to protect personal data and to ensure that data remain private and secure. This is especially important for students, who often have no autonomy in the educational technology they use. Students cannot choose why…
Descriptors: Privacy, Information Security, Data Collection, Student Records
Peer reviewed Peer reviewed
Direct linkDirect link
Duncan Culbreth; Rebekah Davis; Cigdem Meral; Florence Martin; Weichao Wang; Sejal Foxx – TechTrends: Linking Research and Practice to Improve Learning, 2025
Monitoring applications (MAs) use digital and online tools to collect and track data on student behavior, and they have become increasingly popular among schools. Empirical research on these complex surveillance platforms is scant, and little is known about the efficacy or impact that they have on students. This study used a multi-method…
Descriptors: High School Students, COVID-19, Pandemics, Progress Monitoring
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Yinying – TechTrends: Linking Research and Practice to Improve Learning, 2016
Against the backdrop of the ever-increasing influx of big data, this article examines the opportunities and concerns over big data in education. Specifically, this article first introduces big data, followed by delineating the potential opportunities of using big data in education in two areas: learning analytics and educational policy. Then, the…
Descriptors: Educational Research, Data Collection, Data Analysis, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Bhuyan, Jay; Wu, Fan; Thomas, Cassandra; Koong, Kai; Hur, Jung Won; Wang, Chih-hsuan – TechTrends: Linking Research and Practice to Improve Learning, 2020
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the…
Descriptors: Teaching Methods, Grade 10, Grade 11, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Zydney, Janet Mannheimer; Hooper, Simon – TechTrends: Linking Research and Practice to Improve Learning, 2015
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code…
Descriptors: Video Technology, Computer Software, Computer System Design, Design Requirements
Peer reviewed Peer reviewed
Direct linkDirect link
Jones, Beth H.; Chin, Amita Goyal; Aiken, Peter – TechTrends: Linking Research and Practice to Improve Learning, 2014
The increase in smartphone adoption has been no less than astounding. Unfortunately, the explosive growth has been accompanied by a rash of security problems. A contributing factor to the growing security problem is a lack of education, training, and awareness. In addition, "bring your own device" (BYOD) policies often leave security…
Descriptors: Risk, Handheld Devices, Information Security, Undergraduate Students