NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 497 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Andres Felipe Zambrano; Shreya Singhal; Maciej Pankiewicz; Ryan Shaun Baker; Chelsea Porter; Xiner Liu – Information and Learning Sciences, 2025
Purpose: This study aims to evaluate the effectiveness of three large language models (LLMs), GPT-4o, Llama 3.3 70B and Llama 3.1 8B, in redacting personally identifying information (PII) from forum data in massive open online courses (MOOCs). Design/methodology/approach: Forum posts from students enrolled in nine MOOCs were redacted by three…
Descriptors: Artificial Intelligence, Identification, Privacy, Information Security
Erika Huffman – ACT Education Corp., 2025
Student data is an invaluable asset for driving educational success, yet it comes with significant responsibility. As states explore ways to enhance data privacy protections, they must strike a balance between safeguarding sensitive information and leveraging data for student success. This brief examines the best practices in student data privacy…
Descriptors: Data, Privacy, Best Practices, Testing
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ellen B. Mandinach; Edith S. Gummer – Teachers College Record, 2025
Data ethics have emerged as an essential topic in education. Educators must know how to use data effectively and responsibly. This is a complex and systemic issue that involves bringing awareness to all stakeholders, building human capacity, modifying policy, and considering equitable solutions to data use. This article posits an initial framework…
Descriptors: Data Use, Ethics, Decision Making, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Qinyi; Khalil, Mohammad – British Journal of Educational Technology, 2023
The field of learning analytics has advanced from infancy stages into a more practical domain, where tangible solutions are being implemented. Nevertheless, the field has encountered numerous privacy and data protection issues that have garnered significant and growing attention. In this systematic review, four databases were searched concerning…
Descriptors: Privacy, Data, Information Security, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Tian Luo; Pauline S. Muljana; Xinyue Ren; Dara Young – Educational Technology Research and Development, 2025
The emergence of generative artificial intelligence (GenAI) has caused significant disruptions on a global scale in various workplace settings, including the field of instructional design (ID). Given the paucity of research investigating the impact of GenAI on ID work, we conducted a mixed methods study to understand instructional designers (IDs)'…
Descriptors: Artificial Intelligence, Familiarity, Instructional Design, Brainstorming
Peer reviewed Peer reviewed
Direct linkDirect link
Ruixun Dai; Matthew Krehl Edward Thomas; Shaun Rawolle – British Journal of Sociology of Education, 2025
This article applies Foucault's theories of surveillance, disciplinary power, and normalisation to examine the shifting power dynamics in AI-mediated education. Drawing on qualitative responses from 27 English and Chinese-speaking stakeholders, including students, teachers, administrators and parents with no geographical restrictions, this study…
Descriptors: Educational Philosophy, Power Structure, Artificial Intelligence, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eyüp Yurt – International Society for Technology, Education, and Science, 2024
This study addresses the opportunities presented by AI applications in education and the ethical issues brought about by this technology. AI in education holds excellent potential in personalized learning, automated assessment and feedback, and monitoring and analyzing student performance. However, using these technologies also raises ethical…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Hutt, Stephen; Baker, Ryan S.; Ashenafi, Michael Mogessie; Andres-Bray, Juan Miguel; Brooks, Christopher – British Journal of Educational Technology, 2022
Learning analytics research presents challenges for researchers embracing the principles of open science. Protecting student privacy is paramount, but progress in increasing scientific understanding and improving educational outcomes depends upon open, scalable and replicable research. Findings have repeatedly been shown to be contextually…
Descriptors: Learning Analytics, Educational Research, Online Courses, Privacy
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  34