Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 6 |
Descriptor
| Automation | 6 |
| Data Use | 6 |
| Data Collection | 2 |
| Foreign Countries | 2 |
| Information Security | 2 |
| Information Technology | 2 |
| Privacy | 2 |
| Risk | 2 |
| Access to Information | 1 |
| Accountability | 1 |
| Active Learning | 1 |
| More ▼ | |
Source
| Comunicar: Media Education… | 1 |
| Education and Information… | 1 |
| Journal of Computer Assisted… | 1 |
| National Center for Education… | 1 |
| OTESSA Conference Proceedings | 1 |
| The White House | 1 |
Author
| Bonnie Stewart | 1 |
| Calvera-Isabal, Miriam | 1 |
| Dragan Gasevic | 1 |
| Erica Miklas | 1 |
| Halima Alnashiri | 1 |
| Honey, Rose | 1 |
| Hoppe, H. -Ulrich | 1 |
| Jan Vykopal | 1 |
| Joni Lamsa | 1 |
| Ján Dovjak | 1 |
| LaTurner, Jason | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 4 |
| Journal Articles | 3 |
| Guides - General | 1 |
| Reports - Descriptive | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Laws, Policies, & Programs
| Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Halima Alnashiri; Mladen Rakovic; Sadia Nawaz; Xinyu Li; Joni Lamsa; Lyn Lim; Maria Bannert; Sanna Jarvela; Dragan Gasevic – Journal of Computer Assisted Learning, 2025
Background: Integrating information from multiple sources is a common yet challenging learning task for secondary school students. Many underuse metacognitive skills, such as monitoring and control, which are essential for promoting engagement and effective learning outcomes. Objective: This study aims to examine the relationship between…
Descriptors: Secondary School Students, Metacognition, Writing (Composition), English
Meholick, Sarah; Honey, Rose; LaTurner, Jason – National Center for Education Statistics, 2023
Statewide longitudinal data systems (SLDSs) can enable researchers, policymakers, and practitioners to identify and understand important relationships and trends across the education-to-workforce continuum. A well-developed SLDS can increase state and territory governments' ability to establish more informed and equitable policies, enable agency…
Descriptors: Longitudinal Studies, State Programs, State Policy, Data Collection
Bonnie Stewart; Erica Miklas; Samantha Sczyrek; Thu Le – OTESSA Conference Proceedings, 2023
Datafied digital systems have permeated higher education over the past decade. Registration, grading, financial operations, and often teaching all take place through digital platforms that extract and collate data about students as well as faculty and staff. At the level of these data system processes, academics may not have the knowledge or…
Descriptors: Foreign Countries, Higher Education, Data Use, Technology Integration
Calvera-Isabal, Miriam; Santos, Patricia; Hoppe, H. -Ulrich; Schulten, Cleo – Comunicar: Media Education Research Journal, 2023
There is an increasing interest and growing practice in Citizen Science (CS) that goes along with the usage of websites for communication as well as for capturing and processing data and materials. From an educational perspective, it is expected that by integrating information about CS in a formal educational setting, it will inspire teachers to…
Descriptors: Citizen Participation, Science and Society, Scientific and Technical Information, Web Sites
The White House, 2022
Among the great challenges posed to democracy today is the use of technology, data, and automated systems in ways that threaten the rights of the American public. Too often, these tools are used to limit our opportunities and prevent our access to critical resources or services. These problems are well documented. In America and around the world,…
Descriptors: Artificial Intelligence, Algorithms, Privacy, Information Security

Peer reviewed
Direct link
