NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Kaczmarek, Joanne – EDUCAUSE, 2014
The expanding scope of IT initiatives in higher education institutions now goes well beyond basic desktop and enterprise applications. IT is often asked to focus on efforts to establish good information-governance practices. The many aspects of information governance are often found in a records and information management (RIM) program, but not…
Descriptors: Governance, Information Management, Information Policy, Program Administration
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ololube, Nwachukwu Prince; Agbor, Comfort Nkogho; Major, Nanighe Baldwin; Agabi, Chinyere O.; Wali, Worlu I. – International Journal of Education and Development using Information and Communication Technology, 2016
This research is a continuation of a theoretical review that evaluated ICT Policy Outcomes for National Development in relation to Networked Readiness Index (NRI) and the impact it has on knowledge integration and management in higher education institutions in Nigeria. A new dawn in information technology (IT) has initiated new trends in…
Descriptors: Information Technology, Global Approach, Knowledge Management, Higher Education
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Hart, Kevin – CURRENTS, 2010
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Descriptors: Higher Education, Computer Security, Barriers, Confidentiality
Harris, Gregory A. – Association for Institutional Research (NJ1), 2011
Colleges and universities work hard to create environments that encourage student learning, and they develop grading policies, in part, to motivate their students to perform well. Grades provide two kinds of information about a student's abilities and learned knowledge: "internal" information that informs the students themselves about the…
Descriptors: Higher Education, Grades (Scholastic), Access to Information, Educational Policy
Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian – RAND Corporation, 2009
This briefing paper captures the key findings and recommendations of a study commissioned by the Joint Information Systems Committee on aspects of the strategic commitment of institutions to repository sustainability. This project, labelled EMBRACE (EMBedding Repositories And Consortial Enhancement), is aimed at enhancing the functionality,…
Descriptors: Higher Education, Information Systems, Electronic Libraries, Foreign Countries
Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian – RAND Corporation, 2008
Digital repositories can help Higher Education Institutions (HEIs) to develop coherent and coordinated approaches to capture, identify, store and retrieve intellectual assets such as datasets, course material and research papers. With the advances of technology, an increasing number of Higher Education Institutions are implementing digital…
Descriptors: Higher Education, Foreign Countries, Case Studies, Educational Policy
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering