NotesFAQContact Us
Collection
Advanced
Search Tips
Education Level
Higher Education14
Postsecondary Education11
Elementary Secondary Education2
Audience
Teachers1
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lachheb, Ahmed; Abramenka-Lachheb, Victoria; Moore, Stephanie; Gray, Colin – British Journal of Educational Technology, 2023
Maintaining students' privacy in higher education, an integral aspect of learning design and technology integration, is not only a matter of policy and law but also a matter of design ethics. Similar to faculty educators, learning designers in higher education play a vital role in maintaining students' privacy by designing learning experiences…
Descriptors: Design, Ethics, Privacy, Instructional Design
Casey Gogno; Scott Burden; Wyntre Stout – Association for Institutional Research, 2024
Creating a welcoming community is key for an academic environment to thrive. This approach includes accurately representing community members' identities to understand their experiences, and establishing procedures for recording and utilizing individuals' names to support their ability to express their identities freely and without fear of…
Descriptors: Data Collection, Information Storage, Student Characteristics, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Jonathan D.; Levin, Douglas A. – Journal of Cases in Educational Leadership, 2020
School systems collect and maintain increasingly significant amounts of data and information on students, faculty, and staff and have a duty of care to ensure that sensitive information remains secure. Therefore, sitting and/or aspiring school leaders need to develop at least a basic understanding of data privacy and information security…
Descriptors: Information Security, School Policy, Policy Formation, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Michael; Klein, Carrie – Journal of Higher Education, 2020
The proliferation of information technology tools in higher education has resulted in an explosion of data about students and their contexts. Yet, current policies governing these data are limited in their usefulness for informing students, instructors, and administrators of their rights and responsibilities related to data use because they are…
Descriptors: Discourse Analysis, Privacy, School Policy, Policy Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Menevse, Aliye – Educational Research and Reviews, 2019
This study aims to investigate how job search affects self-control of students using social network. This study was conducted on students studying in different departments and within the departments of Physical Education and Sports (BESB). A total of 600 students in the 21 ± 25 age group participated in the employment questionnaire. The statistics…
Descriptors: Job Search Methods, Social Media, Self Control, Physical Education
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Pham, Andy V.; Goforth, Anisa N.; Segool, Natasha; Burt, Isaac – School Psychology Forum, 2014
The increasing use of social networking sites has become an emerging focus in school psychology training, policy, and research. The purpose of the current study is to present data from a survey on social networking among faculty and graduate students in school psychology training programs. A total of 110 faculty and 112 graduate students in school…
Descriptors: College Faculty, Graduate Students, School Psychology, Counselor Training
Glick, David Matthew – ProQuest LLC, 2010
This research explores how organizations decide how to respond to the laws that affect them. It investigates how they convert abstract legal changes into concrete policy responses. Much of the legal impact literature focuses exclusively on either on legal institutions and social outcomes, or on the dynamics within organizations. This work…
Descriptors: Higher Education, Laws, Responses, Policy Formation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nathan, Lisa P.; MacGougan, Alice; Shaffer, Elizabeth – Journal of Education for Library and Information Science, 2014
Social networking tools offer opportunities for innovative, participative pedagogical practice within traditional institutional frameworks. However, tensions continue to develop within this space: between creativity and security, personal and professional identity, privacy and openness. We argue that iSchools are uniquely positioned to create…
Descriptors: Social Networks, School Policy, Educational Technology, Online Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ojo, Omonijo Dare; Ugochukwu, Nnedum Obiajulu Anthony; Obinna, Ezeokana Jude – World Journal of Education, 2011
This study aims at discovering the difference in the perceived lack of privacy in communication and violation of mobile phone rule among students in a Private Christian Mission University, South-West Nigeria. It equally tries to discover if there is a difference in the perceived students' desire to express love to the opposite sex and violation of…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, Privacy
Titus, Aaron – Chronicle of Higher Education, 2008
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Descriptors: Privacy, Educational Environment, Internet, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers