NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Researchers1
Assessments and Surveys
Youth Risk Behavior Survey1
What Works Clearinghouse Rating
Showing 1 to 15 of 28 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Small, Mario L.; Cook, Jenna M. – Sociological Methods & Research, 2023
This article examines an important and thorny problem in interview research: How to assess whether what people say motivated their actions actually did so? We ask three questions: What specific challenges are at play? How have researchers addressed them? And how should those strategies be evaluated? We argue that such research faces at least five…
Descriptors: Interviews, Qualitative Research, Barriers, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Daniels, Benjamin; Boffa, Jody; Kwan, Ada; Moyo, Sizulu – Research Ethics, 2023
Simulated standardized patients (SPs) are trained individuals who pose incognito as people seeking treatment in a health care setting. With the method's increasing use and popularity, we propose some standards to adapt the method to contextual considerations of feasibility, and we discuss current issues with the SP method and the experience of…
Descriptors: Deception, Informed Consent, Simulation, Patients
Peer reviewed Peer reviewed
Direct linkDirect link
de Sousa, Luís; Pinto, Isabel R.; Clemente, Felippe; Gouvêa Maciel, Gustavo – Qualitative Research Journal, 2021
Purpose: This article presents focus groups as a method to enhance questionnaire design to frame and test items for a mass survey on corruption and austerity in democracy. Such methodology lacks systematization when it comes to the description of implementation procedures and the discussion of effective contribution to the development of survey…
Descriptors: Questionnaires, Test Construction, Deception, Focus Groups
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Patel, Pooja; Sarno, Dawn M.; Lewis, Joanna E.; Shoss, Mindy; Neider, Mark B.; Bohil, Corey J. – Applied Cognitive Psychology, 2019
Understanding how computer users allocate attention to features of potentially dangerous emails could help mitigate costly errors. Which features are salient? How stable is attention allocation across variation in email features? We attempted to measure the mental salience of several email features common in spam and/or phishing emails. We created…
Descriptors: Deception, Electronic Mail, Information Security, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Conrique, Beverly G.; McDade-Montez, Elizabeth; Anderson, Pamela M. – Community College Journal of Research and Practice, 2020
Online surveys are an efficient and relatively affordable way to collect data. However, there are issues associated with it, including potential fraudulent data due to accidental or deliberate duplicate entries. In this brief we describe a case study of deliberate duplicate entries in an ongoing study of community college students. Students from…
Descriptors: Data Collection, Data, Two Year College Students, Vocational Education
Peer reviewed Peer reviewed
Direct linkDirect link
Krutka, Daniel G.; Smits, Ryan M.; Willhelm, Troy A. – TechTrends: Linking Research and Practice to Improve Learning, 2021
Google is a multinational technology company whose massive advertising profits have allowed them to expand into many areas, including education. While the company has increasingly faced public scrutiny, the use of Google software and hardware in schools has often resulted in little debate. In this paper, we conduct a technoethical audit of Google…
Descriptors: Search Engines, Educational Technology, Technology Uses in Education, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Alexandron, Giora; Yoo, Lisa Y.; Ruipérez-Valiente, José A.; Lee, Sunbok; Pritchard, David E. – International Journal of Artificial Intelligence in Education, 2019
The rich data that Massive Open Online Courses (MOOCs) platforms collect on the behavior of millions of users provide a unique opportunity to study human learning and to develop data-driven methods that can address the needs of individual learners. This type of research falls into the emerging field of "learning analytics." However,…
Descriptors: Online Courses, Data Collection, Learning Analytics, Reliability
Peer reviewed Peer reviewed
Direct linkDirect link
Rea, Stephen C. – Information and Learning Sciences, 2022
Purpose: This paper aims to offer practical guidance on teaching about digital extremism -- defined here as the intersection of digital disinformation campaigns with political extremism -- by highlighting four pedagogical challenges: the danger of unintentionally "redpilling" students; the slippery slope to false equivalency and…
Descriptors: Information Technology, Antisocial Behavior, Political Attitudes, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Mohadjer, Leyla; Edwards, Brad – Quality Assurance in Education: An International Perspective, 2018
Purpose: This paper aims to provides a brief review of the dashboard literature, an account of the development of performance dashboards for field data collection at Westat, and more specifically for the first cycle of the Programme for the International Assessment of Adult Competencies (PIAAC). A brief concluding section offers suggestions for…
Descriptors: International Assessment, Surveys, Data Collection, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cimpian, Joseph R.; Timmer, Jennifer D. – AERA Open, 2019
Although numerous survey-based studies have found that students who identify as lesbian, gay, bisexual, or questioning (LGBQ) have elevated risk for many negative academic, disciplinary, psychological, and health outcomes, the validity of the types of data on which these results rest have come under increased scrutiny. Over the past several years,…
Descriptors: LGBTQ People, At Risk Students, Responses, High School Students
Office of Inspector General, US Department of Education, 2023
In accordance with the Reports Consolidation Act of 2000, the OIG reports annually on the most serious management and performance challenges the Department faces. For FY 2024, we identified seven management challenges for the Department: (1) Implementing pandemic relief laws for elementary and secondary education; (2) Implementing pandemic relief…
Descriptors: Federal Programs, Educational Finance, Student Financial Aid, Pandemics
Bezir Akçay, Behiye; Usta Gezer, Seda; Kiras, Burak – Online Submission, 2015
Although all kinds of knowledge is valuable, some non-scientific knowledge can cause confusion on students' minds. Science-pseudoscience distinction should be taught in all levels of education to protect especially young age students from this confusion. It is hard to change gained beliefs so giving importance to demarcation from elementary to…
Descriptors: Elementary School Students, Sciences, Misconceptions, Beliefs
Office of Inspector General, US Department of Education, 2021
The Government Performance and Results Modernization Act of 2010 defines major management challenges as programs or management functions that are vulnerable to waste, fraud, abuse, and mismanagement, and where a failure to perform well could seriously affect the ability of the U.S. Department of Education (Department) to achieve its mission or…
Descriptors: Audits (Verification), Inspection, COVID-19, Pandemics
Office of Inspector General, US Department of Education, 2020
In accordance with the Reports Consolidation Act of 2000, the Office of Inspector General (OIG) reports annually on the most serious management and performance challenges the Department faces. OIG's reports include a brief assessment of the Department's progress in addressing the challenges. They also identify further actions that, if properly…
Descriptors: Federal Programs, Educational Finance, Information Security, Audits (Verification)
Previous Page | Next Page »
Pages: 1  |  2