NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 232 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rory McGreal – International Journal of E-Learning & Distance Education, 2023
Micro-credentials can provide easily accessible and transparent evidence of skills or knowledge that have been certified by an authority, based on small units of learning. The recognition and transfer of credits is becoming essential, as an increasing number of students are studying at different institutions, often at the same time, online or in…
Descriptors: Microcredentials, Information Storage, Databases, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Vanessa Miller – Educational Researcher, 2025
The surveillance and securitization of schools has transformed over the last decade to include predictive analytics and algorithms. In Florida, for example, the Pasco Sheriff's Office used school record data sets to identify and monitor youth they believed were "destined for a life of crime." Yet the extent of big data policing as a…
Descriptors: Elementary Secondary Education, Student Rights, Student Records, Confidential Records
Kamara, Kesselly Sheick – ProQuest LLC, 2019
The problem addressed by this study is the strategies analysts need in higher education institutions to improve the protection of personally identifiable and sensitive data. The qualitative exploratory design was used to examine the strategies used by nine analysts. The combined experience of the nine analysts in data analytics, cyber security,…
Descriptors: Higher Education, Information Security, Privacy, Ownership
Peer reviewed Peer reviewed
Direct linkDirect link
Wen, Yiting; Cao, Qinghua; Gao, Di – Cogent Education, 2023
Since the outbreak and spread of COVID-19 all over the world, many countries, including China, are taking measures for epidemic prevention and control, and some measures require citizens to provide personal privacy information. In the era of big data, it is worth paying attention to how people view the collection of personal privacy data under the…
Descriptors: Foreign Countries, Privacy, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Baker, Christina; Gance-Cleveland, Bonnie – Journal of School Nursing, 2021
School-aged children spend around 1,080 hr at school each year and many of them have chronic diseases; therefore, it is imperative to include school nurses as part of the health care team. Care coordination between health care providers and school nurses is currently hindered by communication that relies on an inadequate system of fax, phone, and…
Descriptors: School Nurses, Student Records, Confidential Records, Access to Information
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hildebrandt, Mireille – Journal of Learning Analytics, 2017
This article is a revised version of the keynote presented at LAK '16 in Edinburgh. The article investigates some of the assumptions of learning analytics, notably those related to behaviourism. Building on the work of Ivan Pavlov, Herbert Simon, and James Gibson as ways of "learning as a machine," the article then develops two levels of…
Descriptors: Behaviorism, Data Processing, Profiles, Learning Processes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Canals, Laia – Research-publishing.net, 2017
This chapter sets out various methods for gathering important data on the language uses of participants in a research project. These methods imply interaction between students, teachers and researchers. They are used in the design of research projects based on action research, ethnography or conversational analysis, this being the case with the…
Descriptors: Data Collection, Research Tools, Language Usage, Research Projects
Hewitt, Rachel; Natzler, Michael – Higher Education Policy Institute, 2019
Higher education institutions collect and hold huge amounts of data on students, whether for regulatory purposes or to gather information about students' experiences. In this report we explore students views on data security, learning analytics and the information universities hold and share on students' health and wellbeing. [This report was…
Descriptors: Information Security, Student Attitudes, Young Adults, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Davenport, Robin G. – Journal of College Student Psychotherapy, 2017
The formation of integrated centers on college campuses that combine health services and counseling provide clear advantages for students. There is currently no "best practices" model that informs integrated centers' operational procedures. The "continuity of care" requirement of medical providers can conflict with the strict…
Descriptors: Counseling Services, Campuses, Patients, Informed Consent
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Divya; Ramutsheli, Mashamaite Peterlia – Distance Education, 2016
Personal information is among the most significant assets for businesses today, and clear transactional rules are becoming increasingly important. Organizations, including universities, are charged with more responsibility than ever to protect the personal information used during the course of their business, specifically student data. The paper…
Descriptors: Foreign Countries, Higher Education, Comparative Analysis, Database Management Systems
Federal Trade Commission, 2012
Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…
Descriptors: Federal Legislation, Records (Forms), Student Records, Confidential Records
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  16