Publication Date
| In 2026 | 0 |
| Since 2025 | 8 |
| Since 2022 (last 5 years) | 33 |
| Since 2017 (last 10 years) | 65 |
| Since 2007 (last 20 years) | 70 |
Descriptor
| Data Use | 70 |
| Information Security | 70 |
| Privacy | 46 |
| Data Collection | 43 |
| Student Records | 23 |
| Educational Legislation | 19 |
| Elementary Secondary Education | 19 |
| Higher Education | 19 |
| Compliance (Legal) | 17 |
| Access to Information | 15 |
| Barriers | 14 |
| More ▼ | |
Source
Author
| Celeda, Pavel | 2 |
| Roberson, Amanda Janice | 2 |
| Vykopal, Jan | 2 |
| Amber Morseau | 1 |
| Anderson, Rachel | 1 |
| Annie Irvine | 1 |
| Aparna Ramesh | 1 |
| Bell, Kevin R. | 1 |
| Blackmon, Stephanie J. | 1 |
| Brendan Flanagan | 1 |
| Bussey, Karen | 1 |
| More ▼ | |
Publication Type
Education Level
| Postsecondary Education | 36 |
| Higher Education | 31 |
| Elementary Secondary Education | 19 |
| Early Childhood Education | 4 |
| High Schools | 2 |
| Preschool Education | 2 |
| Secondary Education | 2 |
Audience
| Policymakers | 5 |
| Researchers | 2 |
| Parents | 1 |
| Students | 1 |
| Teachers | 1 |
Location
| California | 4 |
| Utah | 3 |
| Wisconsin | 3 |
| Australia | 2 |
| Connecticut | 2 |
| Georgia | 2 |
| Louisiana | 2 |
| Maryland | 2 |
| Minnesota | 2 |
| Rhode Island | 2 |
| Tennessee (Nashville) | 2 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
| SAT (College Admission Test) | 1 |
What Works Clearinghouse Rating
Vishal Rana; Govand Khalid Azeez – Journal of Higher Education Policy and Management, 2025
The Australian Universities Accord Final Report offers a historic yet insufficient opportunity to advance Indigenous self-determination in higher education. Its goals will remain hollow without dismantling the entrenched colonial foundations embedded in universities' governance and data practices. This paper demands that Indigenous data…
Descriptors: Foreign Countries, Indigenous Populations, Self Determination, Information Security
Ellen B. Mandinach; Edith S. Gummer – Teachers College Record, 2025
Data ethics have emerged as an essential topic in education. Educators must know how to use data effectively and responsibly. This is a complex and systemic issue that involves bringing awareness to all stakeholders, building human capacity, modifying policy, and considering equitable solutions to data use. This article posits an initial framework…
Descriptors: Data Use, Ethics, Decision Making, Elementary Secondary Education
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Eva Heinrich – Open Praxis, 2025
Online proctoring systems are employed to monitor students during exams, safeguarding assessment integrity when in-person observation is not feasible. The systems leverage advanced technologies, including artificial intelligence (AI) and biometrics, to authenticate students and identify potential exam rule violations. However, concerns about data…
Descriptors: Supervision, Privacy, Information Security, Artificial Intelligence
Kalista Peña – Tribal College Journal of American Indian Higher Education, 2025
Native nations have long proven their resilience against the odds, consistently paving a path forward and exercising their sovereign rights as autonomous, self-governing peoples. As the world embarks upon an increasingly digital age, Indigenous peoples face a new threat: datafication. Datafication is "turning nearly every aspect of human life…
Descriptors: Minority Serving Institutions, Tribally Controlled Education, Tribal Sovereignty, Data Use
Carrie Klein; Sean Baser; Jessica Colorado – State Higher Education Executive Officers, 2024
Integrity, security, and sustained investment in data systems are critical for state agencies and stakeholders to effectively harness information to inform policy and decision-making in postsecondary education. Recognizing this crucial need, the State Higher Education Executive Officers Association (SHEEO) has led the charge with its State…
Descriptors: Postsecondary Education, Educational Finance, Governance, Data Collection
Wells Ling; Amber Morseau – Tribal College Journal of American Indian Higher Education, 2025
The federal trust responsibility is a legal obligation, rooted in legal and political precedent, in which the U.S. government commits to protect tribal sovereignty, resources, and welfare. For Indigenous communities, there is a long history of broken promises between the U.S. and tribal governments through discriminatory policies and a lack of…
Descriptors: Consortia, American Indians, Higher Education, Minority Serving Institutions
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
David B. Warner; Lisa McKee – Journal of Cybersecurity Education, Research and Practice, 2024
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity…
Descriptors: Information Security, Privacy, Governance, Compliance (Legal)
Samantha Fu; Charles Davis; Jesse Rothstein; Aparna Ramesh; Evan White – Grantee Submission, 2022
Linking data together can be a powerful way for governments and researchers alike to tackle vexing public policy research problems. However, for researchers, finding ways to link data directly between two departments can often be more challenging than even obtaining the data in the first place. Even when a researcher develops the necessary…
Descriptors: Data Use, Research Methodology, Researchers, Privacy
Michael Klein; Zac Chase, Contributor – Office of Educational Technology, US Department of Education, 2023
This is the third in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Privacy
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Blackmon, Stephanie J. – Change: The Magazine of Higher Learning, 2023
Student privacy is a critical area of higher education that deserves greater focus, particularly as student data digitalization increases. Many colleges and universities use data literacy as a way to prepare students, sometimes from different disciplines, to work with others' data postgraduation. Data literacy can be an avenue for helping all…
Descriptors: Privacy, Data Collection, Data Use, Higher Education
Yun Du – International Journal of Web-Based Learning and Teaching Technologies, 2024
This paper deeply discusses the transformation potential of integrating Internet big data into the pre-school education model in colleges and universities. Through in-depth analysis, we studied the challenges and opportunities faced by preschool education in colleges and universities, and discussed the innovative influence of big data technology…
Descriptors: Educational Innovation, Preschool Education, Data Analysis, Data Collection

Peer reviewed
Direct link
