Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Educational Technology &… | 2 |
Canadian Association of… | 1 |
Journal of European… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
AL Faresi, Ahmed | 1 |
Breslin, John | 1 |
Bultmann, Mareike | 1 |
Chatti, Mohamed Amine | 1 |
Decker, Stefan | 1 |
Drachsler, Hendrik | 1 |
Dyckhoff, Anna Lea | 1 |
Greller, Wolfgang | 1 |
Hogan, Deirdre | 1 |
MacDonaill, Ciaran | 1 |
Neumann, Marco | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Adult Education | 1 |
Audience
Location
Canada | 1 |
Germany | 1 |
Ireland | 1 |
United States | 1 |
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Canadian Association of University Teachers, 2015
Increasingly, university and college administrators are contracting out their institutions' operational information technology (IT) needs. Specifically, this means moving from an IT system with a server based at the institution with an in house IT support staff to a cloud based system outside the institution where most of the staff resources are…
Descriptors: Outsourcing, Information Technology, Universities, Privacy
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Greller, Wolfgang; Drachsler, Hendrik – Educational Technology & Society, 2012
With the increase in available educational data, it is expected that Learning Analytics will become a powerful means to inform and support learners, teachers and their institutions in better understanding and predicting personal learning needs and performance. However, the processes and requirements behind the beneficial application of Learning…
Descriptors: Foreign Countries, Computer Uses in Education, Ethics, Best Practices
Dyckhoff, Anna Lea; Zielke, Dennis; Bultmann, Mareike; Chatti, Mohamed Amine; Schroeder, Ulrik – Educational Technology & Society, 2012
Learning Analytics can provide powerful tools for teachers in order to support them in the iterative process of improving the effectiveness of their courses and to collaterally enhance their students' performance. In this paper, we present the theoretical background, design, implementation, and evaluation details of eLAT, a Learning Analytics…
Descriptors: Foreign Countries, Computer Uses in Education, Semi Structured Interviews, Usability
Neumann, Marco; O'Murchu, Ina; Breslin, John; Decker, Stefan; Hogan, Deirdre; MacDonaill, Ciaran – Journal of European Industrial Training, 2005
Purpose: The motivation for this investigation is to apply social networking features to a semantic network portal, which supports the efforts in enterprise training units to up-skill the employee in the company, and facilitates the creation and reuse of knowledge in online communities. Design/methodology/approach: The paper provides an overview…
Descriptors: Foreign Countries, Knowledge Management, Semantics, Social Networks