Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Micheala Slipp – OTESSA Journal, 2021
This paper presents the qualitative findings from a mixed methods quantitative-qualitative explanatory sequential research project. It investigates unique features of video conferencing technology and how these can be helpful in supporting counsellors in rural, remote, and Northern contexts to mitigate compassion fatigue through video conferencing…
Descriptors: Videoconferencing, Counseling Techniques, Rural Areas, Altruism
National Forum on Education Statistics, 2021
The work of the National Forum on Education Statistics (Forum) is a key aspect of the National Cooperative Education Statistics System (Cooperative System). The Cooperative System was established to produce and maintain, with the cooperation of the states, comparable and uniform education information and data that are useful for policymaking at…
Descriptors: Data Collection, Information Storage, Information Management, Data Use
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
Cardoso, Patricia; Hawk, Dianne V.; Cross, Donna – Health Education & Behavior, 2020
Sixty-eight young people contributed to a Design Thinking Challenge created to elicit a better understanding of their electronic image-sharing experiences, the helpful and harmful consequences of image-sharing to adolescent mental health and safety, and promising interventions that allow young people to make more positive decisions and minimize…
Descriptors: Adolescents, Mental Health, Safety, Intervention
Klose, Mark; Desai, Vasvi; Song, Yang; Gehringer, Edward – International Educational Data Mining Society, 2020
Imagine a student using an intelligent tutoring system. A researcher records the correctness and time of each of your attempts at solving a math problem, nothing more. With no names, no birth dates, no connections to the school, you would think it impossible to track the answers back to the class. Yet, class sections have been identified with no…
Descriptors: Privacy, Learning Analytics, Data Collection, Information Storage
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Noguerón-Liu, Silvia – Journal of Adolescent & Adult Literacy, 2017
This article examines immigrant adults' understandings of privacy, risk, and vulnerability in digital literacy practices that involve visual media. Although the benefits of digital media production have been explored with immigrant youths, the perspectives of adults remain unexplored. Informed by critical and transnational perspectives to digital…
Descriptors: Immigrants, Adults, Privacy, Risk
Mohammed, Zareef – ProQuest LLC, 2017
The privacy paradox is a phenomenon whereby individuals continue to disclose their personal information, contrary to their claim of concerns for the privacy of their personal information. This study investigated the privacy paradox to better understand individuals' decisions to disclose or withhold their personal information. The study argued that…
Descriptors: Privacy, Disclosure, Decision Making, Cognitive Processes
Fidalgo, Patricia; Thormann, Joan – International Association for Development of the Information Society, 2017
This study of teachers in training in UAE addresses Information Literacy skills including ease of learning, usefulness and instructional preferences. Most teachers in training found that IL skills are both useful and ease to learn. Multiple instructional strategies were preferred by the teachers in training. The study also shows that although most…
Descriptors: Information Literacy, Privacy, Computer Security, Information Security
Price, Robert – ProQuest LLC, 2017
This privacy versus security doctoral research examines existing literature, policies, and perceptions to identify the effects of the 2015 San Bernardino terrorist attack on the San Bernardino community. This study contributes to identifying factors that influence perceptions of governmental surveillance. Multiple articles contribute to the…
Descriptors: Privacy, Terrorism, Safety, Influences
Apple, Benjamin G. – ProQuest LLC, 2017
This qualitative study identified those factors that influence the perceived effectiveness of traditional IA control frameworks. The key factors examined in this study are risk management, governance, access control, privacy protection, integrity, availability, reliability, and usability. The researcher endeavored to determine how the…
Descriptors: Information Security, Qualitative Research, Data, Influences
Yilmaz, Yakup; Çelebi, Celalettin – International Online Journal of Education and Teaching, 2022
In this study, effects of values education on students' attitudes and behaviors on informatics ethics taught in information technologies and software courses have been examined, according to the opinions of information technologies teachers (ITT) working in schools where values education is taught through Selcuklu Values Education Project (SEDEP).…
Descriptors: Values Education, Student Attitudes, Student Behavior, Ethics
Nasrollahian Mojarad, Sara; Cruz, Laura – To Improve the Academy, 2022
MegaSoTL projects are scholarship of teaching and learning (SoTL) projects that generate evidence of learning from multiple institutions. While being increasingly practiced, MegaSoTL projects and their potential contribution to improve higher education pedagogy remain understudied in higher education literature. In this article, we introduce…
Descriptors: Scholarship, Teaching Methods, Learning Processes, Higher Education
Education Week, 2022
The use of technology in K-12 education is now more widespread than it ever was before the pandemic, and that is the case even though nearly all schools across the country have transitioned back to in-person learning. Record numbers of students now have their own school-issued digital devices, educators have become more critical evaluators of…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Barriers

Peer reviewed
Direct link
