NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 3,286 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Chen Zhan; Srecko Joksimovic; Djazia Ladjal; Thierry Rakotoarivelo; Ruth Marshall; Abelardo Pardo – IEEE Transactions on Learning Technologies, 2024
Data are fundamental to Learning Analytics (LA) research and practice. However, the ethical use of data, particularly in terms of respecting learners' privacy rights, is a potential barrier that could hinder the widespread adoption of LA in the education industry. Despite the policies and guidelines of privacy protection being available worldwide,…
Descriptors: Privacy, Learning Analytics, Ethics, Data Use
Chen Wang – ProQuest LLC, 2024
Computational learning theory studies the design and analysis of learning algorithms, and it is integral to the foundation of machine learning. In the modern era, classical computational learning theory is growingly unable to catch up with new practical demands. In particular, problems arise in the following aspects: i). "scalability":…
Descriptors: Computation, Learning Theories, Algorithms, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Sarah Hartman-Caverly – Information and Learning Sciences, 2025
Purpose: The purpose of this paper is to consider the contribution of privacy pedagogy to the role of the university. Design/methodology/approach: This paper takes up two arguments; first, it puts forward Arendt's characterization that the purpose of the university is to prepare a new generation for the responsibility of renewing the shared human…
Descriptors: Privacy, College Role, College Instruction, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Andres Felipe Zambrano; Shreya Singhal; Maciej Pankiewicz; Ryan Shaun Baker; Chelsea Porter; Xiner Liu – Information and Learning Sciences, 2025
Purpose: This study aims to evaluate the effectiveness of three large language models (LLMs), GPT-4o, Llama 3.3 70B and Llama 3.1 8B, in redacting personally identifying information (PII) from forum data in massive open online courses (MOOCs). Design/methodology/approach: Forum posts from students enrolled in nine MOOCs were redacted by three…
Descriptors: Artificial Intelligence, Identification, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Kyle M. L. Jones; Amy VanScoy; Alison Harding; Amy Martin – Journal of Computing in Higher Education, 2025
To explore various stakeholders' understanding of student privacy and how protections for it are enacted on their campus, we conducted interviews with 27 faculty, instructional designers, and academic librarians at Very High Research Activity universities across the United States. Although there were no interview questions concerning the pandemic,…
Descriptors: Privacy, Governance, Student Needs, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Marian Horváth; Marek Hlásny; Slávka Krásna – Acta Educationis Generalis, 2025
Introduction: The digital era is reshaping not only technology and economy but also the legal systems governing democratic societies. The rapid emergence of artificial intelligence, big data, and digitisation calls for proactive adaptation of legal frameworks. This article explores the intersection of digital transformation and the rule of law,…
Descriptors: Democracy, Laws, Artificial Intelligence, Governance
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Robinson, Dana; Rosenberg, Linda; Espinoza, Alejandro; Zeidman, Eric – National Center for Education Evaluation and Regional Assistance, 2023
Conducting rigorous impact studies that produce actionable evidence for educators and policymakers is a key goal of the Standards for Excellence in Education Research (SEER). Although studies can be initiated by individual districts or schools, researchers often conduct their own studies to address broadly relevant questions about the…
Descriptors: School Districts, Recruitment, Educational Research, Researchers
Peer reviewed Peer reviewed
Direct linkDirect link
Md. Sayeed Al-Zaman; Ayushi Khemka; Andy Zhang; Geoffrey Rockwell – Journal of Academic Ethics, 2024
The growing significance of social media in research demands new ethical standards and practices. Although a substantial body of literature on social media ethics exists, studies on the ethics of conducting research using social media are scarce. The emergence of new evidence sources, like social media, requires innovative methods and renewed…
Descriptors: Social Media, Ethics, Research, Research Methodology
Peer reviewed Peer reviewed
Direct linkDirect link
Shujun Liu; Luke Sloan; Tarek Al Baghal; Matthew Williams; Curtis Jessop; Paulo Serôdio – International Journal of Social Research Methodology, 2025
Linking survey and social media data has gained popularity. However, obtaining consent from respondents to link social media is a known challenge. Using data from a nationally representative survey of the U.K. this study investigated whether respondents' a) activity frequency, b) activity variety and c) technical skills with smartphones are…
Descriptors: Surveys, Hypermedia, Social Media, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Katherine McDonald; Madison Brodeur; Ariel Schwartz – Journal of Applied Research in Intellectual Disabilities, 2025
Background: We identified participant-level risks and safeguards in social-behavioural research with adults with developmental disabilities. Method: We conducted a qualitative systematic review on risks and safeguards in peer-reviewed research with adults with developmental disabilities. We identified research reporting on risks and safeguards…
Descriptors: Adults, Developmental Disabilities, Research, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Ellen B. Mandinach; Edith S. Gummer – Teachers College Record, 2025
Data ethics have emerged as an essential topic in education. Educators must know how to use data effectively and responsibly. This is a complex and systemic issue that involves bringing awareness to all stakeholders, building human capacity, modifying policy, and considering equitable solutions to data use. This article posits an initial framework…
Descriptors: Data Use, Ethics, Decision Making, Elementary Secondary Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  220