Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Software | 9 |
Data | 9 |
Information Storage | 8 |
Information Technology | 5 |
Information Management | 4 |
Internet | 4 |
Privacy | 4 |
College Students | 3 |
Computer Science Education | 3 |
Computer Security | 3 |
Computer System Design | 3 |
More ▼ |
Source
National School Boards… | 2 |
EDUCAUSE Quarterly | 1 |
International Association for… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Scientific American | 1 |
Topics in Early Childhood… | 1 |
Author
Bennett, Cedric | 1 |
Czuprynski, Christine N. | 1 |
Day, David J. | 1 |
Gray, Peter J. | 1 |
Johnson, LeAnne D. | 1 |
King, Michael A. | 1 |
Lallie, Harjinder Singh | 1 |
Lawson, Phillip | 1 |
Wirth, Niklaus | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Guides - Non-Classroom | 3 |
Collected Works - Proceedings | 1 |
Reports - General | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 3 |
Early Childhood Education | 1 |
Audience
Policymakers | 2 |
Practitioners | 1 |
Researchers | 1 |
Location
United Kingdom | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Johnson, LeAnne D. – Topics in Early Childhood Special Education, 2017
Data-driven decision making is central to improving success of children. Actualizing the use of data is challenging when addressing the social, emotional, and behavioral needs of children across different types of early childhood programs (i.e., early childhood special education, early childhood family education, Head Start, and childcare).…
Descriptors: Teamwork, Problem Solving, Educational Technology, Technology Uses in Education
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Wirth, Niklaus – Scientific American, 1984
Built-in data structures are the registers and memory words where binary values are stored; hard-wired algorithms are the fixed rules, embodied in electronic logic circuits, by which stored data are interpreted as instructions to be executed. Various topics related to these two basic elements of every computer program are discussed. (JN)
Descriptors: Algorithms, Computer Science, Computer Software, Data
Gray, Peter J. – 1984
This manual on microcomputer-based database management programs provides a description of the key characteristics of database software as well as guidelines for designing a database, uses of database programs, and selecting the right software. Three sets of concepts related to database management are listed and explained: creating a database,…
Descriptors: Computer Software, Data, Data Processing, Databases
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers