NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 485 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Qinyi; Khalil, Mohammad – British Journal of Educational Technology, 2023
The field of learning analytics has advanced from infancy stages into a more practical domain, where tangible solutions are being implemented. Nevertheless, the field has encountered numerous privacy and data protection issues that have garnered significant and growing attention. In this systematic review, four databases were searched concerning…
Descriptors: Privacy, Data, Information Security, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Tian Luo; Pauline S. Muljana; Xinyue Ren; Dara Young – Educational Technology Research and Development, 2025
The emergence of generative artificial intelligence (GenAI) has caused significant disruptions on a global scale in various workplace settings, including the field of instructional design (ID). Given the paucity of research investigating the impact of GenAI on ID work, we conducted a mixed methods study to understand instructional designers (IDs)'…
Descriptors: Artificial Intelligence, Familiarity, Instructional Design, Brainstorming
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eyüp Yurt – International Society for Technology, Education, and Science, 2024
This study addresses the opportunities presented by AI applications in education and the ethical issues brought about by this technology. AI in education holds excellent potential in personalized learning, automated assessment and feedback, and monitoring and analyzing student performance. However, using these technologies also raises ethical…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Hutt, Stephen; Baker, Ryan S.; Ashenafi, Michael Mogessie; Andres-Bray, Juan Miguel; Brooks, Christopher – British Journal of Educational Technology, 2022
Learning analytics research presents challenges for researchers embracing the principles of open science. Protecting student privacy is paramount, but progress in increasing scientific understanding and improving educational outcomes depends upon open, scalable and replicable research. Findings have repeatedly been shown to be contextually…
Descriptors: Learning Analytics, Educational Research, Online Courses, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Essohanam Djeki; Jules Dégila; Muhtar Hanif Alhassan – Education and Information Technologies, 2024
COVID-19 has significantly impacted humankind's lifestyle since its emergence. Educational institutions quickly adopted online courses to deal with its spread. Regrettably, the adoption of e-learning solutions, particularly in Africa, has not given due priority to security. However, cyberattacks and cyber incidents are leaping forward. To propose…
Descriptors: Foreign Countries, COVID-19, Pandemics, Electronic Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
María-Jesús Gallego-Arrufat; Inmaculada García-Martínez; María-Asunción Romero-López; Norma Torres-Hernández – Education Policy Analysis Archives, 2024
Studies on digital rights in education have both gained attention and provided a framework for research, policy and practice in educational research within the field of educational technology. The potential benefits we appreciate in Internet use are inseparable from the maximum risks involved. Faced with this responsibility, individuals demand…
Descriptors: Civil Rights, Privacy, Internet, Citizenship Education
Peer reviewed Peer reviewed
Direct linkDirect link
Bashir, Faiza; Warraich, Nosheen Fatima – Interactive Learning Environments, 2023
The study intends to identify the emerging themes of e-learning through the Semantic Web. To highlight the key challenges and explore the core benefits of this mesmerizing technology was another goal of the study. To get the set goals researchers systematically reviewed the literature in five leading databases, out of which one specialized…
Descriptors: Electronic Learning, Technology Uses in Education, Internet, Semantics
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  33