Publication Date
| In 2026 | 0 |
| Since 2025 | 10 |
| Since 2022 (last 5 years) | 48 |
| Since 2017 (last 10 years) | 116 |
| Since 2007 (last 20 years) | 168 |
Descriptor
| Data Collection | 168 |
| Information Security | 168 |
| Privacy | 106 |
| Student Records | 56 |
| Data Analysis | 46 |
| Data Use | 43 |
| Access to Information | 37 |
| Higher Education | 35 |
| Elementary Secondary Education | 30 |
| Ethics | 30 |
| Foreign Countries | 30 |
| More ▼ | |
Source
Author
| Roberson, Amanda Janice | 3 |
| Whitfield, Christina | 3 |
| Armstrong, John | 2 |
| Prinsloo, Paul | 2 |
| Slade, Sharon | 2 |
| Voight, Mamie | 2 |
| Abdirisak Dalmar | 1 |
| Abrantes, Bruno F. | 1 |
| Agley, Daniel | 1 |
| Agley, Jon | 1 |
| Alexander Skulmowski | 1 |
| More ▼ | |
Publication Type
Education Level
Location
| California | 10 |
| European Union | 6 |
| United States | 6 |
| United Kingdom | 5 |
| Australia | 4 |
| Canada | 4 |
| Georgia | 4 |
| Louisiana | 4 |
| Maryland | 4 |
| Minnesota | 4 |
| New Jersey | 4 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 2 |
| Digit Span Test | 1 |
| International Adult Literacy… | 1 |
| National Assessment of… | 1 |
| Raven Progressive Matrices | 1 |
| SAT (College Admission Test) | 1 |
What Works Clearinghouse Rating
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Alexander Skulmowski – Educational Psychology Review, 2024
Unnoticed by most, some technology corporations have changed their terms of service to allow user data to be transferred to clouds and even to be used to train artificial intelligence systems. As a result of these developments, remote data collection may in many cases become impossible to be conducted anonymously. Researchers need to react by…
Descriptors: Artificial Intelligence, Ethics, Research, Information Utilization
Kalista Peña – Tribal College Journal of American Indian Higher Education, 2025
Native nations have long proven their resilience against the odds, consistently paving a path forward and exercising their sovereign rights as autonomous, self-governing peoples. As the world embarks upon an increasingly digital age, Indigenous peoples face a new threat: datafication. Datafication is "turning nearly every aspect of human life…
Descriptors: Minority Serving Institutions, Tribally Controlled Education, Tribal Sovereignty, Data Use
Huda Syyed – Sage Research Methods Cases, 2025
This Case Study provides an understanding of the ways in which intersectional feminist research can be carried out despite the complexities of sensitive data and a precarious landscape. The term "sensitive data" captures the taboo nature and cultural hesitance surrounding women's bodies and the practice of female genital cutting.…
Descriptors: Educational Research, Research Methodology, Feminism, Intersectionality
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Carrie Klein; Sean Baser; Jessica Colorado – State Higher Education Executive Officers, 2024
Integrity, security, and sustained investment in data systems are critical for state agencies and stakeholders to effectively harness information to inform policy and decision-making in postsecondary education. Recognizing this crucial need, the State Higher Education Executive Officers Association (SHEEO) has led the charge with its State…
Descriptors: Postsecondary Education, Educational Finance, Governance, Data Collection
John Jerrim – British Journal of Educational Studies, 2023
Young people are facing an ever-increasing array of online dangers. One of the most common is receipt of a phishing email. This paper presents new evidence on the characteristics of young people most likely to respond to such emails. I find approximately one-in-seven 15-year-olds are at risk of responding to a phishing email, rising to one-in-five…
Descriptors: Information Security, Electronic Mail, Crime, Data Collection
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Juliana Elisa Raffaghelli; Marc Romero Carbonell; Teresa Romeu-Fontanillas – Information and Learning Sciences, 2024
Purpose: It has been demonstrated that AI-powered, data-driven tools' usage is not universal, but deeply linked to socio-cultural contexts. The purpose of this paper is to display the need of adopting situated lenses, relating to specific personal and professional learning about data protection and privacy. Design/methodology/approach: The authors…
Descriptors: Artificial Intelligence, Data Collection, Information Literacy, Intervention
Nurten Gündüz; Mehmet Sincar – Problems of Education in the 21st Century, 2025
Without regulations for higher education institutions in the metaverse, ethical transgressions are unavoidable. Educational metaverse systems, which integrate artificial intelligence, essentially depend on big data as their core technology, leading to considerable privacy issues. Therefore, this study examines data privacy and security issues, a…
Descriptors: Higher Education, Information Security, Privacy, Artificial Intelligence
Wells Ling; Amber Morseau – Tribal College Journal of American Indian Higher Education, 2025
The federal trust responsibility is a legal obligation, rooted in legal and political precedent, in which the U.S. government commits to protect tribal sovereignty, resources, and welfare. For Indigenous communities, there is a long history of broken promises between the U.S. and tribal governments through discriminatory policies and a lack of…
Descriptors: Consortia, American Indians, Higher Education, Minority Serving Institutions
John Y. H. Bai; Olaf Zawacki-Richter; Wolfgang Muskens – Turkish Online Journal of Distance Education, 2024
Artificial intelligence in education (AIEd) is a fast-growing field of research. In previous work, we described efforts to explore the possible futures of AIEd by identifying key variables and their future prospects. This paper re-examines our discussions on the governance of data and the role of students and teachers by considering the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Natural Language Processing, Governance
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection

Peer reviewed
Direct link
