NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 3,259 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Chen Zhan; Srecko Joksimovic; Djazia Ladjal; Thierry Rakotoarivelo; Ruth Marshall; Abelardo Pardo – IEEE Transactions on Learning Technologies, 2024
Data are fundamental to Learning Analytics (LA) research and practice. However, the ethical use of data, particularly in terms of respecting learners' privacy rights, is a potential barrier that could hinder the widespread adoption of LA in the education industry. Despite the policies and guidelines of privacy protection being available worldwide,…
Descriptors: Privacy, Learning Analytics, Ethics, Data Use
Chen Wang – ProQuest LLC, 2024
Computational learning theory studies the design and analysis of learning algorithms, and it is integral to the foundation of machine learning. In the modern era, classical computational learning theory is growingly unable to catch up with new practical demands. In particular, problems arise in the following aspects: i). "scalability":…
Descriptors: Computation, Learning Theories, Algorithms, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Kyle M. L. Jones; Amy VanScoy; Alison Harding; Amy Martin – Journal of Computing in Higher Education, 2025
To explore various stakeholders' understanding of student privacy and how protections for it are enacted on their campus, we conducted interviews with 27 faculty, instructional designers, and academic librarians at Very High Research Activity universities across the United States. Although there were no interview questions concerning the pandemic,…
Descriptors: Privacy, Governance, Student Needs, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Marian Horváth; Marek Hlásny; Slávka Krásna – Acta Educationis Generalis, 2025
Introduction: The digital era is reshaping not only technology and economy but also the legal systems governing democratic societies. The rapid emergence of artificial intelligence, big data, and digitisation calls for proactive adaptation of legal frameworks. This article explores the intersection of digital transformation and the rule of law,…
Descriptors: Democracy, Laws, Artificial Intelligence, Governance
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Robinson, Dana; Rosenberg, Linda; Espinoza, Alejandro; Zeidman, Eric – National Center for Education Evaluation and Regional Assistance, 2023
Conducting rigorous impact studies that produce actionable evidence for educators and policymakers is a key goal of the Standards for Excellence in Education Research (SEER). Although studies can be initiated by individual districts or schools, researchers often conduct their own studies to address broadly relevant questions about the…
Descriptors: School Districts, Recruitment, Educational Research, Researchers
Peer reviewed Peer reviewed
Direct linkDirect link
Md. Sayeed Al-Zaman; Ayushi Khemka; Andy Zhang; Geoffrey Rockwell – Journal of Academic Ethics, 2024
The growing significance of social media in research demands new ethical standards and practices. Although a substantial body of literature on social media ethics exists, studies on the ethics of conducting research using social media are scarce. The emergence of new evidence sources, like social media, requires innovative methods and renewed…
Descriptors: Social Media, Ethics, Research, Research Methodology
Peer reviewed Peer reviewed
Direct linkDirect link
Shujun Liu; Luke Sloan; Tarek Al Baghal; Matthew Williams; Curtis Jessop; Paulo Serôdio – International Journal of Social Research Methodology, 2025
Linking survey and social media data has gained popularity. However, obtaining consent from respondents to link social media is a known challenge. Using data from a nationally representative survey of the U.K. this study investigated whether respondents' a) activity frequency, b) activity variety and c) technical skills with smartphones are…
Descriptors: Surveys, Hypermedia, Social Media, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Katherine McDonald; Madison Brodeur; Ariel Schwartz – Journal of Applied Research in Intellectual Disabilities, 2025
Background: We identified participant-level risks and safeguards in social-behavioural research with adults with developmental disabilities. Method: We conducted a qualitative systematic review on risks and safeguards in peer-reviewed research with adults with developmental disabilities. We identified research reporting on risks and safeguards…
Descriptors: Adults, Developmental Disabilities, Research, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Ángela González-Villa; Adriana Gewerc – E-Learning and Digital Media, 2024
Social networks are colonised by a culture of confession that turns teenager privacy into a commodity to achieve recognition and social acceptance. This display accelerates the porosity of the boundaries between the public and the private and feeds surveillance capitalism. The aim of this systematic review is to examine the empirical evidence on…
Descriptors: Adolescents, Social Networks, Privacy, Interaction
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Nguyen, Andy; Ngo, Ha Ngan; Hong, Yvonne; Dang, Belle; Nguyen, Bich-Phuong Thi – Education and Information Technologies, 2023
The advancement of artificial intelligence in education (AIED) has the potential to transform the educational landscape and influence the role of all involved stakeholders. In recent years, the applications of AIED have been gradually adopted to progress our understanding of students' learning and enhance learning performance and experience.…
Descriptors: Ethics, Artificial Intelligence, Educational Policy, Privacy
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  218