NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 28 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Alexander Skulmowski – Educational Psychology Review, 2024
Unnoticed by most, some technology corporations have changed their terms of service to allow user data to be transferred to clouds and even to be used to train artificial intelligence systems. As a result of these developments, remote data collection may in many cases become impossible to be conducted anonymously. Researchers need to react by…
Descriptors: Artificial Intelligence, Ethics, Research, Information Utilization
Peer reviewed Peer reviewed
Direct linkDirect link
Kalista Peña – Tribal College Journal of American Indian Higher Education, 2025
Native nations have long proven their resilience against the odds, consistently paving a path forward and exercising their sovereign rights as autonomous, self-governing peoples. As the world embarks upon an increasingly digital age, Indigenous peoples face a new threat: datafication. Datafication is "turning nearly every aspect of human life…
Descriptors: Minority Serving Institutions, Tribally Controlled Education, Tribal Sovereignty, Data Use
Huda Syyed – Sage Research Methods Cases, 2025
This Case Study provides an understanding of the ways in which intersectional feminist research can be carried out despite the complexities of sensitive data and a precarious landscape. The term "sensitive data" captures the taboo nature and cultural hesitance surrounding women's bodies and the practice of female genital cutting.…
Descriptors: Educational Research, Research Methodology, Feminism, Intersectionality
Carrie Klein; Sean Baser; Jessica Colorado – State Higher Education Executive Officers, 2024
Integrity, security, and sustained investment in data systems are critical for state agencies and stakeholders to effectively harness information to inform policy and decision-making in postsecondary education. Recognizing this crucial need, the State Higher Education Executive Officers Association (SHEEO) has led the charge with its State…
Descriptors: Postsecondary Education, Educational Finance, Governance, Data Collection
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Juliana Elisa Raffaghelli; Marc Romero Carbonell; Teresa Romeu-Fontanillas – Information and Learning Sciences, 2024
Purpose: It has been demonstrated that AI-powered, data-driven tools' usage is not universal, but deeply linked to socio-cultural contexts. The purpose of this paper is to display the need of adopting situated lenses, relating to specific personal and professional learning about data protection and privacy. Design/methodology/approach: The authors…
Descriptors: Artificial Intelligence, Data Collection, Information Literacy, Intervention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – Problems of Education in the 21st Century, 2025
Without regulations for higher education institutions in the metaverse, ethical transgressions are unavoidable. Educational metaverse systems, which integrate artificial intelligence, essentially depend on big data as their core technology, leading to considerable privacy issues. Therefore, this study examines data privacy and security issues, a…
Descriptors: Higher Education, Information Security, Privacy, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Wells Ling; Amber Morseau – Tribal College Journal of American Indian Higher Education, 2025
The federal trust responsibility is a legal obligation, rooted in legal and political precedent, in which the U.S. government commits to protect tribal sovereignty, resources, and welfare. For Indigenous communities, there is a long history of broken promises between the U.S. and tribal governments through discriminatory policies and a lack of…
Descriptors: Consortia, American Indians, Higher Education, Minority Serving Institutions
Peer reviewed Peer reviewed
PDF on ERIC Download full text
John Y. H. Bai; Olaf Zawacki-Richter; Wolfgang Muskens – Turkish Online Journal of Distance Education, 2024
Artificial intelligence in education (AIEd) is a fast-growing field of research. In previous work, we described efforts to explore the possible futures of AIEd by identifying key variables and their future prospects. This paper re-examines our discussions on the governance of data and the role of students and teachers by considering the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Natural Language Processing, Governance
Peer reviewed Peer reviewed
Direct linkDirect link
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Leo Van Audenhove; Lotte Vermeire; Wendy Van den Broeck; Andy Demeulenaere – Information and Learning Sciences, 2024
Purpose: The purpose of this paper is to analyse data literacy in the new Digital Competence Framework for Citizens (DigComp 2.2). Mid-2022 the Joint Research Centre of the European Commission published a new version of the DigComp (EC, 2022). This new version focusses more on the datafication of society and emerging technologies, such as…
Descriptors: Data Analysis, Data Collection, Information Literacy, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Jennifer Sdunzik; Ann M. Bessenbacher; Wilella D. Burgess; Asia M. Mohamud; Abdirisak Dalmar – American Journal of Evaluation, 2025
The success of development projects and evaluations hinges on having access to research protocols and methodologies that consider the needs and characteristics of stakeholders, subjects, and context while remaining rigorous and culturally sound. These efforts are often complicated by a dearth of tools that have been tested for validity and…
Descriptors: Foreign Countries, Program Evaluation, International Programs, Data Collection
Previous Page | Next Page »
Pages: 1  |  2