NotesFAQContact Us
Collection
Advanced
Search Tips
Education Level
Higher Education13
Postsecondary Education10
Elementary Secondary Education1
Audience
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Casey Gogno; Scott Burden; Wyntre Stout – Association for Institutional Research, 2024
Creating a welcoming community is key for an academic environment to thrive. This approach includes accurately representing community members' identities to understand their experiences, and establishing procedures for recording and utilizing individuals' names to support their ability to express their identities freely and without fear of…
Descriptors: Data Collection, Information Storage, Student Characteristics, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Almaiah, Mohammed Amin; Al-Khasawneh, Ahmad – Education and Information Technologies, 2020
The adoption of mobile cloud computing technology is still at an early stage of implementation in the university campus. This research aims to fill this gap by investigating the main factors that influence on the decision to adopt mobile cloud computing in the university campus. Therefore, this research proposes an integrated model, incorporating…
Descriptors: Information Storage, Handheld Devices, Computer Assisted Instruction, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Hermida, Martin; Imlig-Iten, Nina; Schrackmann, Iwan; Marinus, Eva – Teaching Education, 2023
With the ubiquity of digital media, managing personal data has become part of our daily lives. Teachers have to manage not only their own data, they also manage students' sensitive data and furthermore have to teach data protection to students. In Switzerland, teacher education colleges have hence started to educate students about privacy and data…
Descriptors: Preservice Teachers, Student Attitudes, Social Networks, Data
Isaac, James; Velez, Erin; Roberson, Amanda Janice – Institute for Higher Education Policy, 2023
Students, families, colleges, and lawmakers need clearer information on postsecondary outcomes to make informed decisions. By leveraging data available at institutions and federal agencies, a nationwide student-level data network (SLDN) would close information gaps that persist in our higher education landscape to answer critical questions about…
Descriptors: College Students, Data, Information Networks, Program Design
Peer reviewed Peer reviewed
Direct linkDirect link
Asadi, Zoleixa; Abdekhoda, Mohammadhiwa; Nadrian, Haidar – Education and Information Technologies, 2020
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources including networks, servers, applications, and services. Our aim in this study was to develop and validate an instrument to investigate the determinants of cloud computing services (CCSs) based on Theory of…
Descriptors: Information Storage, Information Management, Higher Education, College Faculty
Hewitt, Rachel; Natzler, Michael – Higher Education Policy Institute, 2019
Higher education institutions collect and hold huge amounts of data on students, whether for regulatory purposes or to gather information about students' experiences. In this report we explore students views on data security, learning analytics and the information universities hold and share on students' health and wellbeing. [This report was…
Descriptors: Information Security, Student Attitudes, Young Adults, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Ifenthaler, Dirk; Schumacher, Clara – Educational Technology Research and Development, 2016
The purpose of this study was to examine student perceptions of privacy principles related to learning analytics. Privacy issues for learning analytics include how personal data are collected and stored as well as how they are analyzed and presented to different stakeholders. A total of 330 university students participated in an exploratory study…
Descriptors: Student Attitudes, Privacy, Data Collection, Data Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers