Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 12 |
Descriptor
Data | 13 |
Information Policy | 13 |
Information Management | 5 |
Access to Information | 4 |
Data Collection | 4 |
Educational Practices | 4 |
Privacy | 4 |
Best Practices | 3 |
Higher Education | 3 |
Information Technology | 3 |
Student Records | 3 |
More ▼ |
Source
Author
Adamus, Trisha | 1 |
Agel, Julie | 1 |
Billings, Philip E. | 1 |
Chen, P. Daniel | 1 |
Corlette, Jill | 1 |
Dennen, Vanessa P. | 1 |
Dietrich, Dianne | 1 |
Estep, Joshua L. | 1 |
Fore, Julie A. | 1 |
Hamblin, David J. | 1 |
Haynes, R. Michael | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Descriptive | 6 |
Reports - Research | 4 |
Reports - Evaluative | 2 |
Tests/Questionnaires | 2 |
Information Analyses | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 4 |
Adult Education | 1 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Illinois | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Williams, Julie Ann Stuart; Billings, Philip E.; Estep, Joshua L.; Pinder, Ashanae D. – Business and Professional Communication Quarterly, 2022
Despite organizations increasingly seeking talent to identify data to make better business decisions, many assignments provide the data for the students. This article encourages curriculum to introduce data and information request dimensions, identify data sources, write data and information requests, and reflect on data request examples. We…
Descriptors: Data, Information Dissemination, Information Policy, Communication Strategies
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Mathies, Charles – New Directions for Institutional Research, 2018
Evidence-based decision-making requires access to good and reliable data. In recent years, there has been a tremendous increase of data available to institutions, from internal as well as external sources. With this increase in data and its analytics, new challenges and questions arise. One of the most pertinent of which is the ethics and best…
Descriptors: Ethics, Information Utilization, Data, Access to Information
Chen, P. Daniel; Haynes, R. Michael – New Directions for Institutional Research, 2015
To whom should higher education institutions provide data, and what is the impact of transparency on institutions?
Descriptors: Accountability, Institutional Research, Higher Education, Data
Dennen, Vanessa P. – Quarterly Review of Distance Education, 2015
The technologies that support online learning are continuously evolving, providing instructors and students with a continuous stream of new tools, features, and functionalities for existing tools. During an online course, instructors and students generate and share a tremendous amount of data using these tools. These data are often created in…
Descriptors: Technological Advancement, Influence of Technology, Student Records, Data
Pasek, Judith E. – Issues in Science and Technology Librarianship, 2017
Sharing scientific research data has become increasingly important for knowledge advancement in today's networked, digital world. This article describes the evolution of access to United States government information in relation to scientific research funded by federal grants. It analyzes the data sharing policy of the National Science Foundation,…
Descriptors: Grants, Data, Information Management, Scientific Research
Johri, Aditya; Yang, Seungwon; Vorvoreanu, Mihaela; Madhavan, Krishna – Advances in Engineering Education, 2016
As part of our NSF funded collaborative project on Data Sharing within Engineering Education Community, we conducted an empirical study to better understand the current climate of data sharing and participants' future expectations of the field. We present findings of this mixed method study and discuss implications. Overall, we found strong…
Descriptors: Engineering Education, Data, Knowledge Management, Educational Practices
Data Sharing Interviews with Crop Sciences Faculty: Why They Share Data and How the Library Can Help
Williams, Sarah C. – Issues in Science and Technology Librarianship, 2013
This study was designed to generate a deeper understanding of data sharing by targeting faculty members who had already made data publicly available. During interviews, crop scientists at the University of Illinois at Urbana-Champaign were asked why they decided to share data, why they chose a data sharing method (e. g., supplementary file,…
Descriptors: Interviews, Shared Resources and Services, Information Networks, Library Role
Dietrich, Dianne; Adamus, Trisha; Miner, Alison; Steinhart, Gail – Issues in Science and Technology Librarianship, 2012
Research libraries have sought to apply their information management expertise to the management of digital research data. This focus has been spurred in part by the policies of two major funding agencies in the United States, which require grant recipients make research outputs, including publications and research data, openly available. As many…
Descriptors: Research Libraries, Academic Libraries, Data, Information Management
Hamblin, David J.; Phoenix, David A. – Journal of Higher Education Policy and Management, 2012
There are increasing demands for higher levels of data assurance in higher education. This paper explores some of the drivers for this trend, and then explains what stakeholders mean by the concept of data assurance, since this has not been well defined previously. The paper captures insights from existing literature, stakeholders, auditors, and…
Descriptors: Higher Education, Educational Technology, Stakeholders, Quality Assurance
Klossner, David; Corlette, Jill; Agel, Julie; Marshall, Stephen W. – New Directions for Institutional Research, 2009
Putting data-driven decision making into practice requires the use of consistent and reliable data that are easily accessible. The systematic collection and maintenance of accurate information is an important component in developing policy and evaluating outcomes. Since 1982, the National Collegiate Athletic Association (NCAA) has been collecting…
Descriptors: College Athletics, Injuries, Decision Making, Data

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers