NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 21 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Janine Arantes – Learning, Media and Technology, 2024
As a result of the growing commercial marketplace for teachers' digital data, a new organization that includes educational data brokers has evolved. Educational data brokerage is relatively intangible due to the ease of de-identified data being collected and sold via educational technology. There is an urgent need to expose how the brokerage of…
Descriptors: Data Collection, Educational Technology, Commercialization, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Sunita Dwivedi; Shinu Vig – Cogent Education, 2024
This study aims to understand the challenges in adoption of blockchain technology in higher education institutions in India using the technological-organizational-environmental (TOE) framework. Blockchain brings transparency, efficiency in working systems, and leveraging trust. The benefits of blockchain are multifaceted and might be beneficial to…
Descriptors: Foreign Countries, Information Technology, Educational Technology, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Doughty, Howard A. – College Quarterly, 2014
In this article, Howard Doughty examines how today's technological devices alter and increasingly substitute for one's body/mind, sociality and (a)morality. He claims that today, under the crushing weightlessness of virtuality, citizens are less confident, more willing to retreat into the idiocy of private life. He goes on to address the…
Descriptors: Information Technology, Computer Mediated Communication, Technology Uses in Education, Educational Technology
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shudong; Heffernan, Neil – British Journal of Educational Technology, 2010
Pedagogical theories and the applications of information technology for language learning have been widely researched in various dimensions. However, ethical issues, such as online privacy and security, and learners' personal data disclosure, are not receiving enough research attention. The perceptions and attitudes from those who participate in…
Descriptors: Information Technology, Educational Technology, Ethics, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Harwood, Paul G.; Asal, Victor – Praeger, 2007
Asal and Harwood explore how today's information technology is changing how teachers educate and are educated. Focusing on the United States, with useful insights from the classroom digital revolution in a few other places (the United Kingdom, Australia, and India), the authors investigate the impact of today's technologies on education--how they…
Descriptors: Foreign Countries, Profiles, Internet, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Alexander, Bryan – Theory Into Practice, 2008
Students are, increasingly, digital content producers, and participate extensively in evolving online social networks. The emergence of the former represents subtle changes in students' experience of images, audience, copyright, ownership of learning, and technology. Experiencing the latter places students in an awkward position in terms of…
Descriptors: Intellectual Property, Educational Technology, Visual Environment, Social Networks
Burbules, Nicholas C.; Callister, Thomas A., Jr. – 2000
This book is an examination of several critical issues and controversies concerning the potential of new information technology (IT) for education. In a series of interrelated essays, the book explores such issues as access, credibility, new approaches to reading and writing, the glut of information, privacy, censorship, commercialization, and…
Descriptors: Access to Information, Censorship, Computer Assisted Instruction, Computer Uses in Education
Peer reviewed Peer reviewed
D'Arcy, Jan – School Libraries in Canada, 1997
Teacher-librarians can learn more about the effect of media and new technologies, and how to introduce these topics in the classroom. The Media Awareness Network World Wide Web site offers well-organized information and teaching units on privacy and other pertinent topics. Provides excerpts of online materials provided by the Media Awareness…
Descriptors: Classroom Communication, Computer Uses in Education, Educational Development, Educational Media
Peer reviewed Peer reviewed
Direct linkDirect link
Waterhouse, Shirley; Rogers, Rodney O. – EDUCAUSE Quarterly, 2004
Most professionals interested in the use of technology in education understand the importance of an e-learning course site, whether the course is taught totally online or in a hybrid environment where the instructor has some face-to-face contact with students. However, many instructors have not thoroughly considered the importance of posting…
Descriptors: Copyrights, Online Courses, Privacy, Educational Technology
Previous Page | Next Page »
Pages: 1  |  2