NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 316 to 330 of 3,637 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Arndt, Timothy – International Association for Development of the Information Society, 2018
Blockchain has emerged as a transformative technology, from its beginning as the basis of cryptocurrencies to wider applications in areas such as property registration and insurance due to its characteristic as a distributed ledger which can remove the need for a trusted third party to facilitate transaction. This spread of the technology to new…
Descriptors: Undergraduate Students, Educational Technology, Information Storage, Student Records
Moore, Colleen; Schrager, Cynthia; Jaeger, Laura – Education Insights Center, 2018
Many campuses across the California State University (CSU) system are seeking to improve academic advising as part of their efforts to increase student progress and graduation rates. In this exploratory study of efforts to improve academic advising at five CSU campuses, researchers at the Education Insights Center (EdInsights) working on behalf of…
Descriptors: Academic Advising, State Universities, Change Strategies, Improvement
Best, Katharina Ley; Pane, John F. – RAND Corporation, 2018
The expansion of education technology is transforming the learning environment in classrooms, schools, school systems, online, and at home. The rise of education technology brings with it an increased opportunity for the collection and application of data, which are valuable resources for educators, schools, policymakers, researchers, and software…
Descriptors: Educational Technology, Technology Uses in Education, Privacy, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Qazdar, Aimad; Er-Raha, Brahim; Cherkaoui, Chihab; Mammass, Driss – Education and Information Technologies, 2019
The use of machine learning with educational data mining (EDM) to predict learner performance has always been an important research area. Predicting academic results is one of the solutions that aims to monitor the progress of students and anticipates students at risk of failing the academic pathways. In this paper, we present a framework for…
Descriptors: Data Analysis, Academic Achievement, At Risk Students, High School Students
Stickland, Rachael – Network for Public Education, 2019
In 1974, Congress passed legislation known as the "Family Educational Rights and Privacy Act" or FERPA, in response to "the growing evidence of the abuse of student records across the nation." The law was written to protect the confidentiality of information held in a student's records. With the introduction of technology in…
Descriptors: Privacy, Information Security, Student Rights, Parent Rights
Usman, Yunusa Dangara – Online Submission, 2019
The study was carried out to establish the impact of information and communication technology (ICT) on tertiary institutions administration in Nasarawa State, Nigeria. A descriptive research design was adopted in conducting this research. Four research questions and hypotheses were used to guide the study to a coherent conclusion. A structured…
Descriptors: Foreign Countries, College Administration, Information Technology, Information Management
Education Commission of the States, 2019
Education Commission of the States (ECS) researched Statewide Longitudinal Data Systems (SLDS) policies in all states, the District of Columbia and Puerto Rico to provide this comprehensive resource. States create their SLDS through a variety of means. The main methods examined in this 50-State Comparison are: statute/legislation, executive order,…
Descriptors: Longitudinal Studies, State Programs, State Policy, Federal Aid
Peer reviewed Peer reviewed
Direct linkDirect link
Starr, Christine R.; Simpkins, Sandra D. – Social Psychology of Education: An International Journal, 2021
This longitudinal study explores three research questions. First, what is the prevalence of math and science gender stereotypes among high school students, their parents, and teachers? Second, are parents' and teachers' gender stereotypes related to adolescents' stereotypes? And third, are adolescents' gender stereotypes associated with their math…
Descriptors: High School Students, Gender Differences, Sex Stereotypes, Longitudinal Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Prinsloo, Paul – E-Learning and Digital Media, 2017
In the socio-technical imaginary of higher education, algorithmic decision-making offers huge potential, but we also cannot deny the risks and ethical concerns. In fleeing from Frankenstein's monster, there is a real possibility that we will meet Kafka on our path, and not find our way out of the maze of ethical considerations in the nexus between…
Descriptors: Mathematics, Decision Making, Higher Education, Data Collection
Johnson, Roscoe A. – ProQuest LLC, 2017
This research compares the academic performance of two groups of students at the community college level of higher education. These two groups are dual credit students and non-dual credit students. The academic records of these students were examined from the years 2010-2014. Students in both groups had completed their formal high school education…
Descriptors: Community Colleges, Two Year College Students, Dual Enrollment, Academic Achievement
World Education Services, 2017
The most important step in evaluating documents for international student admissions is ensuring the authenticity of educational credentials. This article shares the practices and experiences of World Education Services (WES) in obtaining valid international academic credentials. Since WES published "Forged Educational Credentials: A Sorry…
Descriptors: Foreign Students, Admission Criteria, Student Records, Documentation
DeBaun, Bill; Cook, Kendall E. – National College Access Network, 2017
National College Access Network (NCAN) has heard repeatedly and consistently over the years that one of the best aspects of network membership is the ability to collaborate with and learn from other members. In an effort to further the transfer of ideas, in the summer of 2016 NCAN hosted a series of four Idea Incubators across the country, which…
Descriptors: Databases, Information Storage, Data Collection, Student Records
Data Quality Campaign, 2017
Over the past decade, states have made enormous progress in collecting, using, and reporting education data in service of learning--although state legislation has primarily focused on implementing the robust privacy and security protections and data governance structures that make data use safe. In the 2017 legislative session, data privacy…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Jones, Kyle M. L.; McCoy, Chase – Learning, Media and Technology, 2019
In this article, we argue that the contributions of documentation studies can provide a useful framework for analyzing the datafication of students due to emerging learning analytics (LA) practices. Specifically, the concepts of individuals being 'made into' data and how that data is 'considered as' can help to frame vital questions concerning the…
Descriptors: Data Analysis, Documentation, Guidelines, Data Collection
Pages: 1  |  ...  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  ...  |  243