NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 644 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Kyle M. L. Jones; Amy VanScoy; Alison Harding; Amy Martin – Journal of Computing in Higher Education, 2025
To explore various stakeholders' understanding of student privacy and how protections for it are enacted on their campus, we conducted interviews with 27 faculty, instructional designers, and academic librarians at Very High Research Activity universities across the United States. Although there were no interview questions concerning the pandemic,…
Descriptors: Privacy, Governance, Student Needs, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Francis, Mary – ProQuest LLC, 2023
Learning analytics are starting to become standardized in higher education as institutions use the techniques of Big Data analytics to make decisions to help them reach their goals. The widespread use of student information brings forth ethical concerns primarily in relation to privacy. While the overarching ethical issues related to learning…
Descriptors: Learning Analytics, College Students, Privacy, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Kristin Antelman – College & Research Libraries, 2025
In the same way that libraries defend the privacy rights of library users so should they respect library workers' privacy of thought. Diversity, Equity, and Inclusion (DEI) training, as it has been approached in recent years, impinges on privacy of thought and cognitive liberty. It is possible to see the profession's shift away from a…
Descriptors: Diversity Equity and Inclusion, Training, Privacy, Library Personnel
Peer reviewed Peer reviewed
Direct linkDirect link
Seda Özer Sanal; Büsra Çiçek – British Journal of Educational Technology, 2024
In addition to learning effectively and effectively in online learning communities (OLCs), students must be in a secure environment and privacy must be respected. The study aimed to identify privacy violations that university students encounter in OLCs, and identify recommendations and some strategies to implement to ensure privacy at the OLC. A…
Descriptors: Communities of Practice, Electronic Learning, Privacy, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mary Francis; Mejai Bola Mike Avoseh; Karen Card; Lisa Newland; Kevin Streff – Journal of Learning Analytics, 2023
This single-site case study will seek to answer the following question: how is the concept of privacy addressed in relation to a student success information system within a small, public institution of higher education? Three themes were found within the inductive coding process, which used interviews, documentation, and videos as data resources.…
Descriptors: Privacy, Online Systems, Small Colleges, Public Colleges
Stacey von Winckelmann – ProQuest LLC, 2023
The research problem addressed in this study is that racial bias programmed into predictive algorithm recommendations negatively impacts students in historically underrepresented groups. The purpose of this qualitative descriptive study was to explore the perception of algorithm accuracy among data professionals in higher education and explore the…
Descriptors: Prediction, Algorithms, Racism, Accuracy
Peer reviewed Peer reviewed
Direct linkDirect link
Stacey Lynn von Winckelmann – Information and Learning Sciences, 2023
Purpose: This study aims to explore the perception of algorithm accuracy among data professionals in higher education. Design/methodology/approach: Social justice theory guided the qualitative descriptive study and emphasized four principles: access, participation, equity and human rights. Data collection included eight online open-ended…
Descriptors: Prediction, Algorithms, Racism, Accuracy
Peer reviewed Peer reviewed
Direct linkDirect link
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Wollny, Sebastian; Di Mitri, Daniele; Jivet, Ioana; Muñoz-Merino, Pedro; Scheffel, Maren; Schneider, Jan; Tsai, Yi-Shan; Whitelock-Wainwright, Alexander; Gaševic, Dragan; Drachsler, Hendrik – Journal of Computer Assisted Learning, 2023
Background: Learning Analytics (LA) is an emerging field concerned with measuring, collecting, and analysing data about learners and their contexts to gain insights into learning processes. As the technology of Learning Analytics is evolving, many systems are being implemented. In this context, it is essential to understand stakeholders'…
Descriptors: Foreign Countries, College Students, Learning Analytics, Expectation
Lindsey S. Ward – ProQuest LLC, 2023
Educational institutions increasingly rely on educational technology to deliver academic experiences, particularly since the COVID-19 pandemic. This study focused on graduate students' attitudes about online privacy specific to use of technology for educational purposes. Students who participated were all current students at a university in the…
Descriptors: Graduate Students, Student Attitudes, Privacy, Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Mostafa Al-Emran; Bassam Abu-Hijleh; AbdulRahman A. Alsewari – Education and Information Technologies, 2025
Generative Artificial Intelligence (AI) refers to advanced systems capable of creating new content by learning from vast datasets, including text, images, and code. These AI tools are increasingly being integrated into various sectors, including education, where they have the potential to enhance learning experiences. While the existing literature…
Descriptors: Artificial Intelligence, Technology Integration, Information Systems, Success
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  43