NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 16 to 30 of 64 results Save | Export
Waddell, Stanie Adolphus – ProQuest LLC, 2013
Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…
Descriptors: Information Security, Higher Education, Information Policy, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, P. Daniel; Haynes, R. Michael – New Directions for Institutional Research, 2015
To whom should higher education institutions provide data, and what is the impact of transparency on institutions?
Descriptors: Accountability, Institutional Research, Higher Education, Data
Grama, Joanna – EDUCAUSE, 2014
This "Just in Time" research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this…
Descriptors: Higher Education, Information Policy, Information Security, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Sisneros, Lauren; Sponsler, Brian A. – Education Commission of the States, 2016
States and students are increasingly turning to online education programs to provide access to postsecondary education and support credential completion. Recent data indicate that more than 25 percent of postsecondary students take some portion of their coursework online, with 13 percent of students doing so exclusively. Additionally, an…
Descriptors: State Policy, Municipalities, Information Networks, Two Year Colleges
Katsouros, Mark – EDUCAUSE, 2014
In higher education, the IT department is often the service provider for the institution's emergency notification system (ENS). For many institutions, the complexity of providing emergency notification to students, faculty, and staff makes using a local, on-premise solution unrealistic. But finding the right commercially hosted technical solution…
Descriptors: Emergency Programs, Higher Education, Access to Information, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Graham, Rumi – College & Research Libraries, 2016
Recent changes in Canadian copyright law have prompted Canada's educational institutions to reexamine their need for a blanket copying license. Users' rights under the amended Copyright Act now include fair dealing for purposes of education, and the Supreme Court has established that copying short excerpts for classroom use can qualify as fair…
Descriptors: Foreign Countries, Copyrights, Court Litigation, Information Policy
Grama, Joanna Lyn – EDUCAUSE, 2014
The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…
Descriptors: Privacy, Educational Research, Information Policy, Access to Information
Kaczmarek, Joanne – EDUCAUSE, 2014
The expanding scope of IT initiatives in higher education institutions now goes well beyond basic desktop and enterprise applications. IT is often asked to focus on efforts to establish good information-governance practices. The many aspects of information governance are often found in a records and information management (RIM) program, but not…
Descriptors: Governance, Information Management, Information Policy, Program Administration
Higher Education Funding Council for England, 2017
Since September 2016, "relevant higher education bodies" have been subject under the Counter Terrorism and Security Act 2015 to a statutory duty to have due regard to the need to prevent people from being drawn into terrorism. In doing so, they must have particular regard to their existing duties to ensure freedom of speech and consider…
Descriptors: Foreign Countries, Progress Monitoring, Terrorism, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Washington, Edwina Thomas – Adult Learning, 2015
Bullying is a social problem. The proliferation of electronic technology has provided a new forum for bullies to harm victims. That is, bullies can transmit harmful text messages, photos, or video over the Internet and other digital communication devices to victims. This malpractice of technology-oriented phenomenon known as cyberbullying has…
Descriptors: Higher Education, Bullying, Social Networks, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Fritch, Melia; Pitts, Joelle E. – Journal of Electronic Resources Librarianship, 2016
The authors discuss the long-term accumulation of unstandardized and inaccessible content within the Libguides system and the decision-making process to create and implement a set of standards using the migration to the LibGuides2 platform as a vehicle for change. Included in the discussion are strategies for the creation of standards and…
Descriptors: Standard Setting, Information Policy, Compliance (Legal), Change Strategies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McKelvey, Nigel – International Journal of Evaluation and Research in Education, 2014
Adhering to laws whilst working or studying in an educational establishment is often fraught with challenges. The Irish Data Protection Act 1988 (Amendment 2003) strives to protect the individual where their personal data is potentially being abused. The advancements in technologies have facilitated educational establishments by improving…
Descriptors: Higher Education, Information Security, Information Policy, Technological Advancement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Chromey, Kelli J.; Duchsherer, Amy; Pruett, Jennifer; Vareberg, Kyle – Educational Media International, 2016
The purpose of this research is to identify the students' perceptions of social media use in a classroom setting. Knowing students' perceptions of social media can help the instructor build a course that both student and teacher can find effective. Using focus groups this study found a model to determine if social media is an appropriate or…
Descriptors: Social Media, Classroom Techniques, Mass Media Use, Student Attitudes
Pages: 1  |  2  |  3  |  4  |  5