NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 202410
Since 2021 (last 5 years)23
Since 2016 (last 10 years)91
Since 2006 (last 20 years)407
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 1 to 15 of 407 results Save | Export
Ess Pokornowski; Roger C. Schonfeld – ITHAKA S+R, 2024
Research libraries are expected to provide and preserve collections in support of their institutions' research and teaching priorities and to support long-term access to cultural, historical, and scientific works. In today's polarized political environment, both libraries and universities have been at the heart of controversy. In this project, the…
Descriptors: Academic Libraries, Librarians, Censorship, Academic Freedom
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2023
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are "general purpose" units (i.e., municipalities, counties, towns and townships).…
Descriptors: Information Security, Computer Security, Local Government, Public Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cormack, Andrew; Reeve, David – Journal of Learning Analytics, 2022
With student and staff wellbeing a growing concern, several authors have asked whether existing data might help institutions provide better support. By analogy with the established field of Learning Analytics, this might involve identifying causes of stress, improving access to information for those who need it, suggesting options, providing rapid…
Descriptors: Foreign Countries, Well Being, Data Use, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Fernando Filgueiras – Education, Citizenship and Social Justice, 2024
Artificial intelligence (AI) and big data methodologies have provided a vast possibility of applications in different public policy sectors. AI and big data provide essential innovations in school teaching and learning practices, curriculum, and management in education, transforming the entire formulation and implementation of education policy.…
Descriptors: Artificial Intelligence, Social Justice, Technology Uses in Education, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Kim Becnel; Robin A. Moeller – Journal of Education for Library and Information Science, 2024
To understand the effect of library science coursework on student perceptions of issues related to intellectual freedom, researchers surveyed students at the start and end of their enrollment in a Master of Library Science program. When the results were compared, the percentage of graduating students who indicated that they might rethink…
Descriptors: Masters Programs, Graduate Students, Librarians, Librarian Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Priya C. Kumar – Information and Learning Sciences, 2024
Purpose: This article advocates that privacy literacy research and praxis mobilize people toward changing the technological and social conditions that discipline subjects toward advancing institutional, rather than community, goals. Design/methodology/approach: This article analyzes theory and prior work on datafication, privacy, data literacy,…
Descriptors: Privacy, Information Policy, Data Use, Literacy
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Denise Nadasen – Association of Public and Land-grant Universities, 2024
The Data Culture Framework is a high-level guide designed for institutional leaders who want to create and sustain an effective data culture on campus. The Framework offers a set of practices designed to help institutions of higher education create and maintain an effective data-informed community among institutional leaders, faculty, and staff.
Descriptors: Land Grant Universities, Data Collection, Data Use, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Julie Ann Stuart; Billings, Philip E.; Estep, Joshua L.; Pinder, Ashanae D. – Business and Professional Communication Quarterly, 2022
Despite organizations increasingly seeking talent to identify data to make better business decisions, many assignments provide the data for the students. This article encourages curriculum to introduce data and information request dimensions, identify data sources, write data and information requests, and reflect on data request examples. We…
Descriptors: Data, Information Dissemination, Information Policy, Communication Strategies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ndubuisi Friday Ugwu; Adewumi Segun Igbinlade; Raphael Ezamenyi Ochiaka; Ugochi Debora Ezeani; Nnaemeka Chijioke Okorie; Jacob Kehinde Opele; Toyin Segun Onayinka; Obinna Iroegbu; Ogechi Kate Onyekwere; Adijat Bolanle Adams; Precious Aigbona; Folasade Busayo Ojobola – Higher Learning Research Communications, 2024
Objective: The purpose of the study was to clarify, through the lenses of experts and frontline publishers, ethical dilemmas related to the use of artificial intelligence (AI) in research writing. Method: We conducted a rapid review of expert opinions and publishers' policy statements on ethical considerations in using AI for research writing. We…
Descriptors: Research Papers (Students), Research Reports, Academic Language, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Gilman Ranogajec, Mirna; Badurina, Boris – Education for Information, 2021
In today's Information society it is an everyday scenario to be a part of an online community such as social media. Participation has become almost mandatory to the point of acting as a virtual extremity to one's physical environment. This virtual extremity is the individual's window to the outside world and vice versa. The process of being a part…
Descriptors: Confidence Testing, Social Media, Information Security, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ben Williamson; Alex Molnar; Faith Boninger – Commercialism in Education Research Unit, 2024
Ignoring their own well-publicized calls to regulate AI development and to pause implementation of its applications, major technology companies such as Google, Microsoft, and Meta are racing to fend off regulation and integrate artificial intelligence (AI) into their platforms. The weight of the available evidence suggests that the current…
Descriptors: Artificial Intelligence, Technology Uses in Education, Influence of Technology, Federal Regulation
Peer reviewed Peer reviewed
Direct linkDirect link
Manco, Alejandra – SAGE Open, 2022
This literature review aims to examine the approach given to open science policy in the different studies. The main findings are that the approach given to open science has different aspects: policy framing and its geopolitical aspects are described as an asymmetries replication and epistemic governance tool. The main geopolitical aspects of open…
Descriptors: Access to Information, Scientific Research, Data Use, Information Policy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  28