Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 6 |
Descriptor
Data Collection | 6 |
Information Security | 6 |
Student Attitudes | 6 |
Privacy | 4 |
Undergraduate Students | 3 |
Access to Information | 2 |
Case Studies | 2 |
College Students | 2 |
Computer Networks | 2 |
Computer Security | 2 |
Data Interpretation | 2 |
More ▼ |
Source
Australasian Journal of… | 1 |
Change: The Magazine of… | 1 |
Information Systems Education… | 1 |
ProQuest LLC | 1 |
TechTrends: Linking Research… | 1 |
Turkish Online Journal of… | 1 |
Author
Bell, Kevin R. | 1 |
Brandon, Esther | 1 |
Cigdem Meral | 1 |
Duncan Culbreth | 1 |
Florence Martin | 1 |
Howard, Elizabeth V. | 1 |
Ilci, Ahmet | 1 |
Luzeckyj, Ann | 1 |
Rebekah Davis | 1 |
Searle, Bill | 1 |
Sejal Foxx | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Australia | 1 |
China | 1 |
Illinois (Urbana) | 1 |
Japan | 1 |
Massachusetts | 1 |
Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Duncan Culbreth; Rebekah Davis; Cigdem Meral; Florence Martin; Weichao Wang; Sejal Foxx – TechTrends: Linking Research and Practice to Improve Learning, 2025
Monitoring applications (MAs) use digital and online tools to collect and track data on student behavior, and they have become increasingly popular among schools. Empirical research on these complex surveillance platforms is scant, and little is known about the efficacy or impact that they have on students. This study used a multi-method…
Descriptors: High School Students, COVID-19, Pandemics, Progress Monitoring
Brandon, Esther – Change: The Magazine of Higher Learning, 2021
This article describes a 6-week module course called Just Google It! that the author developed and teaches each fall semester. Students who take the course explore personal data collection by private companies, search algorithms, identify implicit bias in the results, and learn the best recommended privacy and security practices. At the end of the…
Descriptors: Technological Literacy, Course Descriptions, Data Collection, Corporations
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Yang, Fang; Wang, Shudong – Turkish Online Journal of Educational Technology - TOJET, 2014
This research investigates East Asian students' perceptions towards e-learning privacy. The survey was first carried out in Japan (N1 = 255) and China (N2 = 307) in 2009. In 2012 the same survey was conducted again in these two countries but with different participants (N3 = 175, N4 = 63). To survey in different countries is to verify whether…
Descriptors: Foreign Countries, Student Attitudes, Educational Technology, Electronic Learning
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics