Publication Date
| In 2024 | 3 |
| Since 2023 | 6 |
| Since 2020 (last 5 years) | 11 |
| Since 2015 (last 10 years) | 25 |
| Since 2005 (last 20 years) | 94 |
Descriptor
| Confidential Records | 616 |
| Privacy | 230 |
| Confidentiality | 224 |
| Student Records | 207 |
| Higher Education | 190 |
| Disclosure | 169 |
| Federal Legislation | 127 |
| Court Litigation | 109 |
| Student Rights | 92 |
| Legal Responsibility | 91 |
| Elementary Secondary Education | 83 |
| More ▼ | |
Source
Author
Publication Type
Education Level
| Higher Education | 31 |
| Postsecondary Education | 19 |
| Elementary Secondary Education | 18 |
| Adult Education | 10 |
| Elementary Education | 3 |
| Secondary Education | 3 |
| High Schools | 1 |
| Junior High Schools | 1 |
| Two Year Colleges | 1 |
Audience
| Practitioners | 55 |
| Administrators | 34 |
| Policymakers | 11 |
| Teachers | 11 |
| Media Staff | 8 |
| Parents | 6 |
| Researchers | 6 |
| Counselors | 5 |
| Students | 4 |
| Community | 1 |
Location
| Canada | 13 |
| United States | 11 |
| California | 8 |
| New York | 6 |
| Australia | 5 |
| Oregon | 5 |
| United Kingdom | 5 |
| Colorado | 4 |
| Pennsylvania | 4 |
| Arizona | 3 |
| Maryland | 3 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Annick Zijlstra; Tessel Sterenborg; Maroesjka Nieuwenhuijzen; Bram O. Castro – Journal of Applied Research in Intellectual Disabilities, 2024
Background: Newborns of parents with intellectual disabilities face higher risks in their environment for child unsafety, despite parents' good intentions. To help parents prevent unsafe circumstances, a good understanding of the risk factors faced by these parents is needed. Methods: This casefile study examined (1) which risk factors were…
Descriptors: Intellectual Disability, Parents with Disabilities, Pregnancy, Case Records
Rory McGreal – International Journal of E-Learning & Distance Education, 2023
Micro-credentials can provide easily accessible and transparent evidence of skills or knowledge that have been certified by an authority, based on small units of learning. The recognition and transfer of credits is becoming essential, as an increasing number of students are studying at different institutions, often at the same time, online or in…
Descriptors: Microcredentials, Information Storage, Databases, Technology Uses in Education
Ranieri, V.; Stynes, H.; Kennedy, E. – Research Ethics, 2021
The Confidentiality Advisory Group (CAG) is a specialised body that advises the Health Research Authority (HRA) and the Secretary of State for Health on requests for access to confidential information, in the absence of informed consent from its owners. Its primary role is to oversee the safe use of such information and to counsel the governing…
Descriptors: Foreign Countries, Advisory Committees, Confidentiality, Access to Information
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Kamara, Kesselly Sheick – ProQuest LLC, 2019
The problem addressed by this study is the strategies analysts need in higher education institutions to improve the protection of personally identifiable and sensitive data. The qualitative exploratory design was used to examine the strategies used by nine analysts. The combined experience of the nine analysts in data analytics, cyber security,…
Descriptors: Higher Education, Information Security, Privacy, Ownership
Wen, Yiting; Cao, Qinghua; Gao, Di – Cogent Education, 2023
Since the outbreak and spread of COVID-19 all over the world, many countries, including China, are taking measures for epidemic prevention and control, and some measures require citizens to provide personal privacy information. In the era of big data, it is worth paying attention to how people view the collection of personal privacy data under the…
Descriptors: Foreign Countries, Privacy, COVID-19, Pandemics
Thompson, Hale M. – Health Education & Behavior, 2021
Background: Advocates have endorsed transgender visibility via gender identity (GI) data capture with the advent of the Affordable Care Act and electronic health record (EHR) requirements. Visibility in data in order to enumerate a population contrasts with ways in which other LGBT and public health scholars have deployed these concepts. Aims: The…
Descriptors: Confidential Records, Records (Forms), LGBTQ People, Sexual Identity
Baker, Christina; Gance-Cleveland, Bonnie – Journal of School Nursing, 2021
School-aged children spend around 1,080 hr at school each year and many of them have chronic diseases; therefore, it is imperative to include school nurses as part of the health care team. Care coordination between health care providers and school nurses is currently hindered by communication that relies on an inadequate system of fax, phone, and…
Descriptors: School Nurses, Student Records, Confidential Records, Access to Information
Van der Veer Martens, Betsy – Education for Information, 2017
The information ethics of Luciano Floridi's well-known Philosophy of Information (PI) project are explored as potential foundations for a deepening sense of stewardship in library and information studies (LIS) practice. The implications of PI's world view of "information objects" as having intrinsic value and resulting moral rights…
Descriptors: Information Science Education, Trust (Psychology), Ethics, Educational Philosophy
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Halder, Basudev; Mitra, Sucharita; Mitra, Madhuchhanda – International Journal of Web-Based Learning and Teaching Technologies, 2020
This paper illustrates the cloud-based telemonitoring framework that implements healthcare automation system for myocardial infarction (MI) disease classification. For this purpose, the pathological feature of ECG signal such as elevated ST segment, inverted T wave, and pathological Q wave are extracted, and MI disease is detected by the…
Descriptors: Access to Health Care, Automation, Information Storage, Telecommunications
Hildebrandt, Mireille – Journal of Learning Analytics, 2017
This article is a revised version of the keynote presented at LAK '16 in Edinburgh. The article investigates some of the assumptions of learning analytics, notably those related to behaviourism. Building on the work of Ivan Pavlov, Herbert Simon, and James Gibson as ways of "learning as a machine," the article then develops two levels of…
Descriptors: Behaviorism, Data Processing, Profiles, Learning Processes
Canals, Laia – Research-publishing.net, 2017
This chapter sets out various methods for gathering important data on the language uses of participants in a research project. These methods imply interaction between students, teachers and researchers. They are used in the design of research projects based on action research, ethnography or conversational analysis, this being the case with the…
Descriptors: Data Collection, Research Tools, Language Usage, Research Projects

Peer reviewed
Direct link
