NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 25 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Janine Arantes – Learning, Media and Technology, 2024
As a result of the growing commercial marketplace for teachers' digital data, a new organization that includes educational data brokers has evolved. Educational data brokerage is relatively intangible due to the ease of de-identified data being collected and sold via educational technology. There is an urgent need to expose how the brokerage of…
Descriptors: Data Collection, Educational Technology, Commercialization, Privacy
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Sanfilippo, Madelyn Rose; Apthorpe, Noah; Brehm, Karoline; Shvartzshnaider, Yan – Information and Learning Sciences, 2023
Purpose: This paper aims to address research gaps around third party data flows in education by investigating governance practices in higher education with respect to learning management system (LMS) ecosystems. The authors answer the following research questions: How are LMS and plugins/learning tools interoperability (LTI) governed at higher…
Descriptors: Privacy, Governance, Learning Management Systems, Information Technology
Rene David Chacon – ProQuest LLC, 2021
With the increasing data security awareness of mobile crowdsensing (MCS) participants, smartphone app developers are continually developing technical security protections, but with little consideration on human behaviors. Information technology (IT) advancements seen in the introduction of homomorphic encryption and privacy preserving…
Descriptors: Graduate Students, Student Participation, Handheld Devices, Computer Oriented Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Peer reviewed Peer reviewed
Direct linkDirect link
Pence, Harry E. – Journal of Educational Technology Systems, 2015
Big Data is currently a hot topic in the field of technology, and many campuses are considering the addition of this topic into their undergraduate courses. Big Data tools are not just playing an increasingly important role in many commercial enterprises; they are also combining with new digital devices to dramatically change privacy. This article…
Descriptors: Data Collection, Privacy, Undergraduate Study, Technology Uses in Education
Scibelli, David B. – ProQuest LLC, 2013
With the Internet advancements of information systems and social media channels, consumer data has become a valuable source for companies and social networking communities. These Internet businesses are allowed to use and share their customers' information, with minimal regulatory intervention other than in health and financial areas. This…
Descriptors: Internet, Consumer Economics, Privacy, Trust (Psychology)
Peer reviewed Peer reviewed
Direct linkDirect link
Lovaas, Jessica L. – Global Studies of Childhood, 2016
Young people in the child welfare system are subjected to intensive and wide-ranging observation, surveillance and documentation practices that have been facilitated by the expanding use of digital technologies. Drawing on qualitative research, this article examines the pervasiveness of these governmental practices and their impacts on the…
Descriptors: Foster Care, Child Welfare, Archives, Observation
Peer reviewed Peer reviewed
Direct linkDirect link
Pence, Harry E. – Journal of Educational Technology Systems, 2014
Big Data Analytics is a topic fraught with both positive and negative potential. Big Data is defined not just by the amount of information involved but also its variety and complexity, as well as the speed with which it must be analyzed or delivered. The amount of data being produced is already incredibly great, and current developments suggest…
Descriptors: Data Analysis, Data Collection, Privacy, Definitions
Peer reviewed Peer reviewed
Direct linkDirect link
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Doyle, Kenny – Research-publishing.net, 2013
Surveillance is typically envisaged as the act of a person being physically watched, their movements and behaviour monitored in a given space and time. While this type of watching undoubtedly takes place, there is also the more subtle and pervasive monitoring of people through the data they accumulate in their daily lives. Contemporary Irish…
Descriptors: Foreign Countries, Data Collection, Information Technology, Privacy
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
Previous Page | Next Page ยป
Pages: 1  |  2