NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
General Educational…1
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Xuandong Zhao – ProQuest LLC, 2024
The rapid advancement of powerful Large Language Models (LLMs), such as ChatGPT and Llama, has revolutionized the world by bringing new creative possibilities and enhancing productivity. However, these advancements also pose significant challenges and risks, including the potential for misuse in the form of fake news, academic dishonesty,…
Descriptors: Computational Linguistics, Intellectual Property, Artificial Intelligence, Productivity
Peer reviewed Peer reviewed
Direct linkDirect link
Mohammed Airaj – Education and Information Technologies, 2024
This paper proposes a human-centered approach to using Artificial Intelligence (AI) in higher education that promotes equitable access to knowledge while preserving privacy and ethics. Through the lens of third-generation Activity Theory we examine the interaction between three activity systems in higher education: AI teachers, human teachers, and…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Higher Education
Grama, Joanna Lyn – Institute for Higher Education Policy, 2019
Our current federal postsecondary data system is incomplete and fails to provide today's students with the accurate, timely information that they need to inform their college choices and promote their success. As policymakers consider proposals to improve this federal data system, it is critical that they work in tandem to protect students'…
Descriptors: Privacy, Information Security, Postsecondary Education, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Hamilton, Clovia; Swart, William; Stokes, Gerald M. – Online Submission, 2021
We address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence, the ongoing research in Artificial Cognitive Assistants, and the explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri, spurred on by…
Descriptors: Rating Scales, Ethics, Compliance (Legal), Artificial Intelligence
Privacy Technical Assistance Center, 2016
In February 2014, the Privacy Technical Assistance Center (PTAC) issued guidance titled "Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices." This Model Terms of Service document is intended to further assist schools and school districts in implementing that guidance. In a traditional…
Descriptors: Privacy, Student Records, Contracts, Educational Legislation
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich – Journal of Learning Analytics, 2016
To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…
Descriptors: Privacy, Guidelines, Ethics, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rodríguez-Triana, María Jesús; Martínez-Monés, Alejandra; Villagrá-Sobrino, Sara – Journal of Learning Analytics, 2016
As a further step towards maturity, the field of learning analytics (LA) is working on the definition of frameworks that structure the legal and ethical issues that scholars and practitioners must take into account when planning and applying LA solutions to their learning contexts. However, current efforts in this direction tend to be focused on…
Descriptors: Ethics, Privacy, Instructional Innovation, Higher Education
GED Testing Service, 2018
The manual is presented in the form of a policy grid. The grid includes a consolidated list of General Educational Development (GED) Testing Service policies regarding the GED® test and overall GED® program. The grid combines all of the policies into one unified table and supersedes any prior policy manual.
Descriptors: High School Equivalency Programs, Equivalency Tests, Testing Programs, Educational Policy
Foundation for Excellence in Education (ExcelinEd), 2016
Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…
Descriptors: Student Records, Information Security, Privacy, Information Utilization
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Previous Page | Next Page »
Pages: 1  |  2