NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Policymakers1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 12 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
Almaiah, Mohammed Amin; Al-Khasawneh, Ahmad – Education and Information Technologies, 2020
The adoption of mobile cloud computing technology is still at an early stage of implementation in the university campus. This research aims to fill this gap by investigating the main factors that influence on the decision to adopt mobile cloud computing in the university campus. Therefore, this research proposes an integrated model, incorporating…
Descriptors: Information Storage, Handheld Devices, Computer Assisted Instruction, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Hermida, Martin; Imlig-Iten, Nina; Schrackmann, Iwan; Marinus, Eva – Teaching Education, 2023
With the ubiquity of digital media, managing personal data has become part of our daily lives. Teachers have to manage not only their own data, they also manage students' sensitive data and furthermore have to teach data protection to students. In Switzerland, teacher education colleges have hence started to educate students about privacy and data…
Descriptors: Preservice Teachers, Student Attitudes, Social Networks, Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Emrich, Val; Senior, Erin; Ford, Gregg; Hicks, Laura; Riesett, Brandon – Knowledge Quest, 2019
Openly licensed educational resources (OER) are an untapped opportunity for free, quality resources to expand a school library collection. As with any library asset, they must be evaluated to ensure that they are in fact free and openly licensed. The Maryland State Department of Education (MSDE) has created an OER repository and has learned…
Descriptors: Open Source Technology, Shared Resources and Services, School Libraries, Library Materials
Peer reviewed Peer reviewed
Direct linkDirect link
Asadi, Zoleixa; Abdekhoda, Mohammadhiwa; Nadrian, Haidar – Education and Information Technologies, 2020
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources including networks, servers, applications, and services. Our aim in this study was to develop and validate an instrument to investigate the determinants of cloud computing services (CCSs) based on Theory of…
Descriptors: Information Storage, Information Management, Higher Education, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Crossen-White, Holly L. – Research Ethics, 2015
Online digital archives have allowed researchers to explore the past as never before. Arguably without the search technology offered by online digital archives the lives of many individuals would have remained in obscurity. Furthermore, the level of detail that can be quickly gleaned about individuals from the past, particularly when multiple…
Descriptors: Archives, Information Storage, Ethics, History
Hewitt, Rachel; Natzler, Michael – Higher Education Policy Institute, 2019
Higher education institutions collect and hold huge amounts of data on students, whether for regulatory purposes or to gather information about students' experiences. In this report we explore students views on data security, learning analytics and the information universities hold and share on students' health and wellbeing. [This report was…
Descriptors: Information Security, Student Attitudes, Young Adults, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Ifenthaler, Dirk; Schumacher, Clara – Educational Technology Research and Development, 2016
The purpose of this study was to examine student perceptions of privacy principles related to learning analytics. Privacy issues for learning analytics include how personal data are collected and stored as well as how they are analyzed and presented to different stakeholders. A total of 330 university students participated in an exploratory study…
Descriptors: Student Attitudes, Privacy, Data Collection, Data Analysis
Hsiao, D. K.; And Others – 1974
A description is provided of a conceptual model for a data secure system. The discussion first offers a formal working vocabulary and next, using the intuitive idea of a dichotomy between permissible and impermissible accesses, formalizes the idea with an Extended Logical Data Base and with protection specifications and patterns. These…
Descriptors: Computers, Conceptual Schemes, Confidentiality, Databases
Peer reviewed Peer reviewed
Nisenoff, Norman; And Others. – Information Processing and Management, 1979
Considers the implications of possible policy initiatives in the United States in light of Swedish experience in dealing with the privacy of computerized records. (CWM)
Descriptors: Case Studies, Confidential Records, Confidentiality, Federal Regulation
General Accounting Office, Washington, DC. – 1986
In order to examine the implementation of the Privacy Act of 1974 by federal government agencies, the General Accounting Office (GAO) examined organizational issues at 13 cabinet-level departments and the Veterans Administration and reviewed Privacy Act operations in detail at 6 of these agencies and 37 of their components. This study focused on…
Descriptors: Access to Information, Automation, Compliance (Legal), Disclosure