Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kristin Antelman – College & Research Libraries, 2025
In the same way that libraries defend the privacy rights of library users so should they respect library workers' privacy of thought. Diversity, Equity, and Inclusion (DEI) training, as it has been approached in recent years, impinges on privacy of thought and cognitive liberty. It is possible to see the profession's shift away from a…
Descriptors: Diversity Equity and Inclusion, Training, Privacy, Library Personnel
Ruixun Dai; Matthew Krehl Edward Thomas; Shaun Rawolle – British Journal of Sociology of Education, 2025
This article applies Foucault's theories of surveillance, disciplinary power, and normalisation to examine the shifting power dynamics in AI-mediated education. Drawing on qualitative responses from 27 English and Chinese-speaking stakeholders, including students, teachers, administrators and parents with no geographical restrictions, this study…
Descriptors: Educational Philosophy, Power Structure, Artificial Intelligence, Technology Uses in Education
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy
Jiangyi Cui; Ruijiao Li; Qiushu Chen; Libin Liu; Xuan Zhao; Kai Liu; Huiliang Shang – International Journal of Technology in Education and Science, 2025
Face anonymization in intelligent experimental education is crucial for privacy protection. This paper presents a novel, real-time face blurring system for smart experimental settings. Our key contributions include: 1) customized YOLOv8 (Multi-Scale Feature Fusion YOLOv8) algorithm achieving 96% accuracy at 22.67 fps for 1080p video. 2) An…
Descriptors: Privacy, Experiments, Confidentiality, Ethics
Melissa Beck Wells – Discover Education, 2025
The integration of artificial intelligence (AI) into augmentative and alternative communication (AAC) systems has revolutionized the way non-verbal individuals interact with their environment. AI-powered symbolic text prediction offers innovative solutions to enhance expressive and receptive communication, promoting autonomy and social inclusion.…
Descriptors: Artificial Intelligence, Augmentative and Alternative Communication, Prediction, Interpersonal Communication
Seda Özer Sanal; Büsra Çiçek – British Journal of Educational Technology, 2024
In addition to learning effectively and effectively in online learning communities (OLCs), students must be in a secure environment and privacy must be respected. The study aimed to identify privacy violations that university students encounter in OLCs, and identify recommendations and some strategies to implement to ensure privacy at the OLC. A…
Descriptors: Communities of Practice, Electronic Learning, Privacy, College Students
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Christian Genest; James A. Hanley; Sahir R. Bhatnagar – Journal of Statistics and Data Science Education, 2024
This article provides an introduction to randomized response polling, a technique which was designed to allow for questioning on sensitive issues while protecting the respondent's privacy and avoiding social desirability bias. It is described in terms that are suitable for presentation and use in any classroom environment. Instructions for plain…
Descriptors: Foreign Countries, Randomized Controlled Trials, Controversial Issues (Course Content), Privacy
Mengjiao Zhang – ProQuest LLC, 2024
The rise of Artificial Intelligence technology has raised concerns about the potential compromise of privacy due to the handling of personal data. Private AI prevents cybercrimes and falsehoods and protects human freedom and trust. While Federated Learning offers a solution by model training across decentralized devices or servers, thereby…
Descriptors: Privacy, Cooperative Learning, Natural Language Processing, Learning Processes
Sean Groth; Erica Southgate – Australian Educational Researcher, 2024
Contemporary education is being undeniably shaped by datafication, and while new algorithmic and automated decision-making processes can have educational benefits, they also raise issues about children's digital rights and education policy responses to these rights. This study mapped how children's digital right to privacy and related human rights…
Descriptors: Foreign Countries, Childrens Rights, Internet, Privacy
Eyüp Yurt – International Society for Technology, Education, and Science, 2024
This study addresses the opportunities presented by AI applications in education and the ethical issues brought about by this technology. AI in education holds excellent potential in personalized learning, automated assessment and feedback, and monitoring and analyzing student performance. However, using these technologies also raises ethical…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Ethics
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Shu, Di; Li, Xiaojuan; Her, Qoua; Wong, Jenna; Li, Dongdong; Wang, Rui; Toh, Sengwee – Research Synthesis Methods, 2023
Missing data complicates statistical analyses in multi-site studies, especially when it is not feasible to centrally pool individual-level data across sites. We combined meta-analysis with within-site multiple imputation for one-step estimation of the average causal effect (ACE) of a target population comprised of all individuals from all…
Descriptors: Meta Analysis, Outcomes of Treatment, Privacy, Attribution Theory
Mary Francis; Mejai Bola Mike Avoseh; Karen Card; Lisa Newland; Kevin Streff – Journal of Learning Analytics, 2023
This single-site case study will seek to answer the following question: how is the concept of privacy addressed in relation to a student success information system within a small, public institution of higher education? Three themes were found within the inductive coding process, which used interviews, documentation, and videos as data resources.…
Descriptors: Privacy, Online Systems, Small Colleges, Public Colleges
Stacey von Winckelmann – ProQuest LLC, 2023
The research problem addressed in this study is that racial bias programmed into predictive algorithm recommendations negatively impacts students in historically underrepresented groups. The purpose of this qualitative descriptive study was to explore the perception of algorithm accuracy among data professionals in higher education and explore the…
Descriptors: Prediction, Algorithms, Racism, Accuracy

Peer reviewed
Direct link
