NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 148 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Jones, Kyle M. L.; Goben, Abigail; Perry, Michael R.; Regalado, Mariana; Salo, Dorothea; Asher, Andrew D.; Smale, Maura A.; Briney, Kristin A. – portal: Libraries and the Academy, 2023
Higher education data mining and analytics, like learning analytics, may improve learning experiences and outcomes. However, such practices are rife with student privacy concerns and other ethics issues. It is crucial that student privacy expectations and preferences are considered in the design of educational data analytics. This study forefronts…
Descriptors: College Students, Student Attitudes, Data Collection, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Whitelock-Wainwright, Alexander; Gaševic, Dragan; Tejeiro, Ricardo; Tsai, Yi-Shan; Bennett, Kate – Journal of Computer Assisted Learning, 2019
Student engagement within the development of learning analytics services in Higher Education is an important challenge to address. Despite calls for greater inclusion of stakeholders, there still remains only a small number of investigations into students' beliefs and expectations towards learning analytics services. Therefore, this paper presents…
Descriptors: Expectation, Learning Analytics, Questionnaires, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
McCartney, Shelagh; Rosenvasser, Ximena – SAGE Open, 2022
Students' privacy expectations in university housing have increased, a change that has been reflected in universities shifting from traditional units to increasing numbers of apartments and suites. This study examines privacy and territories in student university housing architecture, using architectural plans of 76 residences, relating the…
Descriptors: Universities, College Students, College Housing, Dormitories
Pure, Rebekah Abigail – ProQuest LLC, 2013
Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…
Descriptors: Social Networks, Web Sites, Privacy, Constitutional Law
Peer reviewed Peer reviewed
Direct linkDirect link
Whitelock-Wainwright, Alexander; Gaševic, Dragan; Tsai, Yi-Shan; Drachsler, Hendrik; Scheffel, Maren; Muñoz-Merino, Pedro J.; Tammets, Kairit; Delgado Kloos, Carlos – Journal of Computer Assisted Learning, 2020
To assist higher education institutions in meeting the challenge of limited student engagement in the implementation of Learning Analytics services, the Questionnaire for Student Expectations of Learning Analytics (SELAQ) was developed. This instrument contains 12 items, which are explained by a purported two-factor structure of "Ethical and…
Descriptors: Questionnaires, Test Construction, Test Validity, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Fossey, Richard – Journal of College and University Student Housing, 2018
College students who reside in campus dormitories at public universities have a reasonable expectation of privacy in their dorm rooms that is protected by the fourth amendment; and officials cannot search these rooms for law enforcement purposes without a valid warrant. Non-students, however, have no such reasonable expectation of privacy in…
Descriptors: College Students, Public Colleges, Privacy, Dormitories
Bellanca, James A.; Lavert, Gwendolyn Battle; Bellanca, Kate – Solution Tree, 2022
Rely on "Shifting to Digital" to deliver clear and concise answers to all of your remote teaching questions. This comprehensive guide provides specific strategies for planning high-engagement instruction, handling technology, assessing collaboration and assignments, and more. You'll also gain access to a helpful list of digital tools,…
Descriptors: Technology Uses in Education, Learner Engagement, Teaching Methods, Web Based Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Viberg, Olga; Engström, Linda; Saqr, Mohammed; Hrastinski, Stefan – Education and Information Technologies, 2022
In order to successfully implement learning analytics (LA), we need a better understanding of student expectations of such services. Yet, there is still a limited body of research about students' expectations across countries. Student expectations of LA have been predominantly examined from a view that perceives students as a group of individuals…
Descriptors: Learning Analytics, Student Attitudes, Expectation, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Felzmann, Heike – Research-publishing.net, 2013
This chapter discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in the Irish context in relation to its application to internet research. The chapter begins with a brief outline of high profile cases in the early history of the internet that highlighted specific emerging…
Descriptors: Foreign Countries, Ethics, Internet, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Sefcik, Lesley; Veeran-Colton, Terisha; Baird, Michael; Price, Connie; Steyn, Steve – Australasian Journal of Educational Technology, 2022
This study aimed to understand the effects of a custom-developed, artificial intelligence-based, asynchronous remote invigilation system on the student user experience. The study was conducted over 3 years at a large Australian university, and findings demonstrate that familiarity with the system over time improved student attitudes towards remote…
Descriptors: Usability, Users (Information), Student Attitudes, Supervision
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gupta, Shikha – Journal of Research Practice, 2017
This article presents an overview of internet-based research, highlighting the absence of a standard terminology to define and classify such research. The label internet-based research or online research can cover a diverse range of research designs and methods, involving different degrees of ethical concern regarding privacy, transparency,…
Descriptors: Ethics, Research Design, Design Requirements, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Gannon, William L. – Journal of Geography in Higher Education, 2014
Geography has promoted responsibility in science for decades. However, a monster is on the loose of our own creation and is wreaking havoc. Geocoded/locational data have enormous research potential. However, expectations of privacy and confidentiality norms flux and turn gray. Does graduate training sufficiently prepare students to respond to…
Descriptors: Geography Instruction, Ethical Instruction, Graduate Study, Geographic Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nowak, Benjamin; Glenn, William J. – Education Leadership Review of Doctoral Research, 2017
Lower courts are beginning to grapple with challenges to students' Fourth Amendment right to be free from unreasonable search and seizure as it relates to the digital environment, cell phones in particular. Recently, lower courts in several states have applied standards set forth decades ago to decide cases involving searches of students' mobile…
Descriptors: Telecommunications, Handheld Devices, Privacy, Expectation
Peer reviewed Peer reviewed
Direct linkDirect link
Weinstein, Emily; James, Carrie – Teachers College Record, 2021
Background/Context: Digital life raises dilemmas that elude straightforward courses of action. These dilemmas are consequential to civic life, where participatory practices intersect with digital affordances to lend new power, stakes, and public consequences (Kahne et al., 2015). It is essential that students be able to recognize digital dilemmas…
Descriptors: Teacher Attitudes, Civics, Citizenship Education, Ethical Instruction
Edwards, Keith – ProQuest LLC, 2015
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Descriptors: Computer Security, Information Security, Decision Making, Self Efficacy
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10