NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
State Educational Technology Directors Association, 2021
Data modernization and security practices allow educational leaders to provide accurate, secure, and timely data that can be securely exchanged, shared, and connected in order to provide instant understanding of school performance, student attendance, academic performance, or funding from multiple sources. This matters because: (1) Data…
Descriptors: Data, Information Security, Student Records, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Perrotta, Carlo – Learning, Media and Technology, 2013
This paper contends that powerful techniques to manipulate data, enabled by technological and economic developments, can be easily co-opted to serve the restrictive frameworks of hyper-controlling, managerial accountability that characterise current cultures of summative assessment in education. In response to these challenges, research is…
Descriptors: Literacy, Research Needs, Barriers, Performance Factors