NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Georgia Criterion Referenced…1
What Works Clearinghouse Rating
Showing 1 to 15 of 520 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Stacey von Winckelmann – ProQuest LLC, 2023
The research problem addressed in this study is that racial bias programmed into predictive algorithm recommendations negatively impacts students in historically underrepresented groups. The purpose of this qualitative descriptive study was to explore the perception of algorithm accuracy among data professionals in higher education and explore the…
Descriptors: Prediction, Algorithms, Racism, Accuracy
Peer reviewed Peer reviewed
Direct linkDirect link
Stacey Lynn von Winckelmann – Information and Learning Sciences, 2023
Purpose: This study aims to explore the perception of algorithm accuracy among data professionals in higher education. Design/methodology/approach: Social justice theory guided the qualitative descriptive study and emphasized four principles: access, participation, equity and human rights. Data collection included eight online open-ended…
Descriptors: Prediction, Algorithms, Racism, Accuracy
Peer reviewed Peer reviewed
Direct linkDirect link
Allyson Skene; Laura Winer; Erika Kustra – International Journal for Academic Development, 2024
This article explores potential uses, misuses, beneficiaries, and tensions of learning analytics in higher education. While those promoting and using learning analytics generally agree that ethical practice is imperative, and student privacy and rights are important, navigating the complex maze of ethical dilemmas can be challenging, particularly…
Descriptors: Learning Analytics, Higher Education, Ethics, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
José Pedro Amorim; Thiago Freires; Fernanda Rodrigues; Joaquim Luís Coimbra; Isabel Menezes – Journal of Higher Education Outreach and Engagement, 2023
University social responsibility (USR) is a fashionable concept that is often presented as a paradox, with the implication that it can help universities meet the social dimension of higher education, without questioning the hegemonic meanings of academic excellence and the university mission. We draw on data collected through a focus group of…
Descriptors: Universities, Social Responsibility, Educational Change, Higher Education
Jenay Robert – EDUCAUSE, 2025
In the "2024 EDUCAUSE Horizon Report: Cybersecurity and Privacy Edition," a panel of experts agreed that a key practice for advancing the future of higher education cybersecurity and privacy is supporting agency, trust, transparency, and involvement among stakeholders. In fact, these are such important topics for the higher education…
Descriptors: Higher Education, Futures (of Society), Educational Trends, Trust (Psychology)
Peer reviewed Peer reviewed
Direct linkDirect link
Blackmon, Stephanie J.; Major, Claire H. – British Journal of Educational Technology, 2023
This systematic review involved reexamining student perceptions of privacy in online, hybrid and technology-enhanced courses. The research questions included identifying key findings from studies on student privacy. The researchers followed the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology and completed…
Descriptors: Student Attitudes, Privacy, Online Courses, Blended Learning
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Tel Amiel – Prospects, 2024
Public educational systems and institutions have increased their adoption of proprietary educational platforms offered by large private corporations. Platforms now critically mediate content creation and storage, interaction and communication, record-keeping and institutional memory. This platformization of education has led to significant risks…
Descriptors: Open Education, Educational Technology, Higher Education, Governance
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kudzayi Savious Tarisayi; Ronald Manhibi – Journal of Learning and Teaching in Digital Age, 2025
This paper critically examines the transformative potential of Artificial Intelligence (AI) in Zimbabwe's higher education system, focusing on how AI can enhance learning outcomes and optimize administrative processes. The study employs a qualitative research approach, gathering insights from key stakeholders in the educational sector to identify…
Descriptors: Foreign Countries, Artificial Intelligence, Technology Uses in Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Rebecca E. Heiser; Agnieszka Palalas; Ashley Gollert – Australasian Journal of Educational Technology, 2025
As higher education institutions increasingly adopt videoconferencing technologies to broaden access to learning, the need for evidence-based, inclusive practices to support digital well-being becomes paramount. Integrating these technologies into the curriculum necessitates careful design considerations to prevent unintended consequences and…
Descriptors: Higher Education, Videoconferencing, Inclusion, Well Being
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Kyle M. L. Jones; Michael R. Perry; Mariana Regalado – Sage Research Methods Cases, 2022
This case study describes the design and implementation of scenario-based focus groups run by a collaborative research team consisting of eight individuals spread across eight institutions within the United States. Originally intended to be face-to-face, the research team pivoted mid-study to adapt the scenario design for the fully online…
Descriptors: Case Studies, Reflection, Focus Groups, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stewart, Bonnie E. – Contemporary Educational Technology, 2023
This paper is a critical case study tracing the professional history of a self-professed open educator over more than two decades. It frames the narrative of an individual as a window on the broader arc of the field, from early open learning as a means of widening participation, through the rise of the participatory web at scale, to the current…
Descriptors: Internet, Privacy, Open Education, Higher Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  35