NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 301 to 315 of 3,637 results Save | Export
Phillips, Meredith; Reber, Sarah; Rothstein, Jesse – Policy Analysis for California Education, PACE, 2018
Modern computing technology makes it possible for governments at all levels to use the data they already collect to improve service coordination and delivery, and to conduct research and evaluation to inform policymaking. California is well behind other states in taking advantage of this opportunity, in education and in other fields. The state has…
Descriptors: Data Use, Educational Improvement, State Programs, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Zhu, Yimei – Journal of Marketing for Higher Education, 2019
Using a novel longitudinal methodological design, this is the first study to investigate how and to what extent UK higher education institutions (HEIs) use Chinese social media platforms to engage with users. The data was gathered from examining 163 UK HEIs' use of Weibo public accounts in 2012 and 2018 and WeChat in 2018, combined with student…
Descriptors: Longitudinal Studies, Social Media, Marketing, Higher Education
Anderson, Leslie M.; Meredith, Julie; Schmidt, Rebecca Anne; Pratt-Williams, Jaunelle; Jonas, Deborah L.; Vandersall, Kirk – Office of Planning, Evaluation and Policy Development, US Department of Education, 2019
The children of migratory agricultural workers and fishers are extremely disadvantaged and more likely than their nonmigratory peers to live in poverty and experience disconnected educational experiences that can hinder their educational progress and success. Congress established the Migrant Education Program (MEP) in 1966 through an amendment to…
Descriptors: Educational Legislation, Elementary Secondary Education, Federal Legislation, Migrant Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeon, Byungsoo; Shafran, Eyal; Breitfeller, Luke; Levin, Jason; Rosé, Carolyn P. – International Educational Data Mining Society, 2019
This paper addresses a key challenge in Educational Data Mining, namely to model student behavioral trajectories in order to provide a means for identifying students most at risk, with the goal of providing supportive interventions. While many forms of data including clickstream data or data from sensors have been used extensively in time series…
Descriptors: Online Courses, At Risk Students, Academic Achievement, Academic Failure
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gruver, Nate; Malik, Ali; Capoor, Brahm; Piech, Chris; Stevens, Mitchell L.; Paepcke, Andreas – International Educational Data Mining Society, 2019
Understanding large-scale patterns in student course enrollment is a problem of great interest to university administrators and educational researchers. Yet important decisions are often made without a good quantitative framework of the process underlying student choices. We propose a probabilistic approach to modelling course enrollment…
Descriptors: Models, Course Selection (Students), Enrollment, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Al Baghal, Tarek – International Journal of Social Research Methodology, 2016
Understanding factors associated with consent for data linkage has largely focussed on adults, but parents or guardians can also be asked to consent on behalf of children for whom they are responsible. A framework for consent decision is presented, and is tested using a large nationally representative survey asking mothers to consent for both…
Descriptors: Foreign Countries, Mothers, Early Adolescents, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Chang, Bo – Distance Education, 2021
This study explored student privacy issues in online learning environments. Vignettes are used to present the various privacy scenarios occurred in online learning environment. The study showed that there are direct legal ramifications of concern to students, as a result of sharing individual grades among group members and providing public…
Descriptors: Electronic Learning, Online Courses, Graduate Students, Student Rights
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sokal, Laura; Vermette, Laurie Anne – Journal of Postsecondary Education and Disability, 2017
Over eight thousand test administrations across two universities were examined to determine whether students with disabilities were being given the necessary extended testing time accommodations and whether their use of extended time decreased over the course of their programs. Findings revealed that commonly accepted recommendations about…
Descriptors: Higher Education, Student Needs, Testing Accommodations, Time
Foundation for Excellence in Education (ExcelinEd), 2017
The effective use of student data is essential for improving student outcomes and equipping educators with the information they need to help every student remain on a path to educational success. Student data can help teachers personalize and customize instruction, equip parents and students with information to make informed educational choices,…
Descriptors: Student Records, Privacy, Information Security, Information Utilization
Ohio Coalition for the Education of Children with Disabilities, 2022
Special education, for students ages 3 to 21, is guided by federal and state requirements. The federal requirements are referred to as the Individuals with Disabilities Education Act (IDEA). The state requirements are referred to as the Ohio Operating Standards for the Education of Children with Disabilities (Ohio Operating Standards). IDEA…
Descriptors: Federal Legislation, Educational Legislation, Equal Education, Students with Disabilities
Yahya, Muhammad; Wijoyo, Hadion – Online Submission, 2020
This research aims to develop a student data management system at 9 Tapung Junior High School (SMP) Negeri 9 Tapung, which has not documented using a computer or school web using text-based programming languages like HTML, JavaScript, CSS, and PHP. The student information system design at SMP Negeri 9 Tapung in its manufacture uses a literacy…
Descriptors: Junior High Schools, Information Systems, Student Records, Student Characteristics
Colston, Jared; Fowler, Gregory; Laitinen, Amy; McCann, Clare; Studley, Jamienne; Tandberg, David; Weeden, Dustin – New America, 2020
Between the 2008-09 and 2016-17 school years, over 300 degree-granting higher education institutions in the United States have closed their doors. An overwhelming majority of these recently closed institutions are for-profit colleges, which often serve a population of disproportionately low-income students receiving Pell Grants and federal loans.…
Descriptors: School Closing, Institutional Survival, Colleges, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Qazdar, Aimad; Er-Raha, Brahim; Cherkaoui, Chihab; Mammass, Driss – Education and Information Technologies, 2019
The use of machine learning with educational data mining (EDM) to predict learner performance has always been an important research area. Predicting academic results is one of the solutions that aims to monitor the progress of students and anticipates students at risk of failing the academic pathways. In this paper, we present a framework for…
Descriptors: Data Analysis, Academic Achievement, At Risk Students, High School Students
Stickland, Rachael – Network for Public Education, 2019
In 1974, Congress passed legislation known as the "Family Educational Rights and Privacy Act" or FERPA, in response to "the growing evidence of the abuse of student records across the nation." The law was written to protect the confidentiality of information held in a student's records. With the introduction of technology in…
Descriptors: Privacy, Information Security, Student Rights, Parent Rights
Pages: 1  |  ...  |  17  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  25  |  ...  |  243