Remove 2009 Remove Data Remove E-rate Remove EdTech
article thumbnail

?Overcoming Hacking and Cybercrimes — The Next Obstacle to Edtech

Edsurge

Even without social security numbers, student and staff data have monetary value for spammers and marketers. Rather than go to the trouble of reselling data, some hackers find it more lucrative to hold a district’s data to ransom. Hackers simply lock users out of their own data until a ransom is paid.

EdTech 60
article thumbnail

U.S. K-12 Educational Technology Policy: Historical Notes on the Federal Role

Doug Levin

Finally, somewhat for the sake of brevity, I have excluded consideration of the role of the E-rate (which is overseen by the Federal Communications Commission and not the U.S. FY 2009 $269,900,000 (President Bush’s request: $0). FY 2009 ( American Recovery and Reinvestment Act of 2009 special appropriation ): $650,000,000.

Policies 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 7 Key Elements of eSpark’s Theory of Learning

eSpark

Our team uses an 85% positive rating as a baseline. Providing teachers with data on their students’ learning levels and suggested materials aligned to their gaps is correlated to student learning outcomes (Bergan et al., They’re encouraged to complete Quests simply for the fun of the activities. International Education Studies, 4(4).

article thumbnail

Why We Don't Need a 'Netflix for Education'

Edsurge

If the views expressed by leading edtech companies are any indication, the race to become the first 'Netflix of Education' is gathering steam. One feature of Netflix in particular seems to have captured the imagination of edtech companies. References Bjork, E. Do Learners Really Know Best? & Bjork, R.

article thumbnail

The 100 Worst Ed-Tech Debacles of the Decade

Hack Education

That being said, if you’re using a piece of technology that’s free, it’s likely that your personal data is being sold to advertisers or at the very least hoarded as a potential asset (and used, for example, to develop some sort of feature or algorithm). It works well, that is, if you disregard student data privacy and security.

Pearson 145