Publication Date
In 2025 | 3 |
Since 2024 | 14 |
Since 2021 (last 5 years) | 44 |
Since 2016 (last 10 years) | 92 |
Since 2006 (last 20 years) | 133 |
Descriptor
Source
Author
Cardoso, Patricia | 2 |
Khlaif, Zuheir N. | 2 |
Martin, Florence | 2 |
Pieschl, Stephanie | 2 |
Salha, Soheil | 2 |
Wang, Chuang | 2 |
Abbas, June | 1 |
Adorjan, Michael | 1 |
Agosto, Denise E. | 1 |
Ainsworth, Shaaron | 1 |
Aldaihan, Mohammad A. | 1 |
More ▼ |
Publication Type
Education Level
Location
Australia | 7 |
California | 7 |
Israel | 6 |
Turkey | 6 |
United Kingdom | 6 |
United Kingdom (England) | 4 |
United States | 4 |
Canada | 3 |
Colorado | 3 |
Germany | 3 |
Hong Kong | 3 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
Digit Span Test | 1 |
Florida Comprehensive… | 1 |
Raven Progressive Matrices | 1 |
SAT (College Admission Test) | 1 |
State of Texas Assessments of… | 1 |
Texas Essential Knowledge and… | 1 |
UCLA Loneliness Scale | 1 |
What Works Clearinghouse Rating
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Ephraim Matala Kgwete – Discourse and Communication for Sustainable Education, 2024
Principals are faced with some frustrating situations from time to time in their line of duty in which they must make a variety of decisions affecting their students. This study argues that principals need to understand how to apply professional discretion in their practice and be accountable for their judgements and decisions to avoid the notion…
Descriptors: Foreign Countries, Secondary Schools, Principals, Administrator Attitudes
Keri M. Guilbault; Yi Wang; Kimberly M. McCormick – Gifted Child Today, 2025
Artificial intelligence (AI) has the potential to revolutionize education by promoting personalized learning experiences and enhancing educators' efficiency. Generative AI tools like ChatGPT are increasingly used by K-12 teachers for lesson planning, differentiated instruction, and automated feedback. This article examines how ChatGPT, in…
Descriptors: Artificial Intelligence, Computer Uses in Education, Secondary School Students, Academically Gifted
Stornaiuolo, Amy; Monea, Bethany – Written Communication, 2023
This article explores the mobile and material dimensions of a writing practice we call pocket writing. Emergent in our 6-year ethnographic fieldwork at a public high school, this practice involved adolescents composing and carrying their self-sponsored writing close to their bodies. We consider the pocket both a physical artifact--the place from…
Descriptors: High School Students, Public Schools, Writing (Composition), Personal Autonomy
Sophie Atherton – Gender and Education, 2024
Trans people's use of single-sex toilet facilities has become the subject of public attention, academic debate and research in recent years. One common solution is to offer transgender students access to an alternative toilet or changing space, such as an accessible toilet. However, in this paper, I critically engage with the suggestion that…
Descriptors: LGBTQ People, Sexual Identity, Student Experience, Sanitary Facilities
van Driel, Sharisse; Jarodzka, Halszka; Crasborn, Frank; van Strien, Johan; Brand-Gruwel, Saskia – International Journal of Research & Method in Education, 2023
Although various academic disciplines use data papers to support effective research practices, data papers are still uncommon in the educational sciences. Main goals of data papers are enhancing transparency regarding research processes and supporting data sharing among researchers and thus, open science. As many educational research projects…
Descriptors: Classroom Techniques, Educational Research, Data Use, Data Analysis
Greenhalgh, Spencer P.; DiGiacomo, Daniela K.; Barriage, Sarah – Information and Learning Sciences, 2023
Purpose: The purpose of this paper is to examine how higher education students think about educational technologies they have previously used -- and the implications of this understanding for their awareness of datafication and privacy issues in a postsecondary context. Design/methodology/approach: The authors conducted two surveys about students'…
Descriptors: Ethics, Privacy, Learning Management Systems, Learning Analytics
Calatrava, Maria; de Irala, Jokin; Osorio, Alfonso; Benítez, Edgar; Lopez-del Burgo, Cristina – Educational and Psychological Measurement, 2022
Anonymous questionnaires are frequently used in research with adolescents in order to obtain sincere answers about sensitive topics. Most longitudinal studies include self-generated identification codes (SGICs) to match information. Typical elements include a combination of letters and digits from personal data. However, these data may make the…
Descriptors: Privacy, Questionnaires, Coding, Adolescents
Luca Botturi; Tiffany Fioroni; Chiara Beretta; Davide Andreoletti; Alessandro Ferrari; Felipe Cardoso; Anna Picco-Schwendener; Suzanna Marazza; Silvia Giordano – Educational Technology Research and Development, 2024
Privacy is a central issue in the digitalization of society and directly concerns all Internet users. Privacy education is part of the picture of a more just digital society: it aims at making users more aware of the importance of their data and of the technical and financial tools and processes that involve their personal data. Nonetheless,…
Descriptors: Computer Simulation, Privacy, Internet, Student Behavior
Taylor, Robert S. – Theory and Research in Education, 2022
Writing a college-application essay has become a rite of passage for high-school seniors in the United States, one whose importance has expanded over time due to an increasingly competitive admissions process. Various commentators have noted the disturbing evolution of these essays over the years, with an ever-greater emphasis placed on obstacles…
Descriptors: Trauma, Victims, Essays, College Admission
John, Nicholas; Joeckel, Sven; Epstein, Dmitry; Dogruel, Leyla – Learning, Media and Technology, 2023
The social distancing and lockdown measures enacted to address the COVID-19 pandemic entailed an unprecedented shift to digitally-mediated communication. The move to remote learning at schools was one of such important changes. Drawing on privacy and STS literature, we investigate the role of different privacy cultures during the initial moment of…
Descriptors: Foreign Countries, COVID-19, Pandemics, Distance Education
Ferguson, Daniel E.; Nichols, T. Philip – International Journal of Qualitative Studies in Education (QSE), 2021
In field-based research, masking practices, as well as the general practice of relegating historical context to abstracted 'site descriptions' in a paper's methodology section, can produce a tacit inattention to historical specificity. By juxtaposing two case studies of schools, this article examines the ways school sites are haunted by…
Descriptors: Privacy, Educational Research, History, Qualitative Research
Yacobson, Elad; Fuhrman, Orly; Hershkowitz, Sara; Alexandron, Giora – Journal of Learning Analytics, 2021
Learning analytics have the potential to improve teaching and learning in K-12 education, but as student data is increasingly being collected and transferred for the purpose of analysis, it is important to take measures that will protect student privacy. A common approach to achieve this goal is the de-identification of the data, meaning the…
Descriptors: Identification, Privacy, Field Trips, Learning Analytics
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security