Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Author
Chen, P. Daniel | 1 |
Hamblin, David J. | 1 |
Haynes, R. Michael | 1 |
Matsudaira, Jordan | 1 |
Nixon, Andrea | 1 |
Phoenix, David A. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Opinion Papers | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Chen, P. Daniel; Haynes, R. Michael – New Directions for Institutional Research, 2015
To whom should higher education institutions provide data, and what is the impact of transparency on institutions?
Descriptors: Accountability, Institutional Research, Higher Education, Data
Matsudaira, Jordan – Urban Institute, 2017
The federal role in higher education has grown over the past two decades, and now a new administration has the opportunity to strengthen policies that support students and their colleges and universities. To help inform these decisions, the Urban Institute convened a bipartisan group of scholars and policy advisers to write a series of memos…
Descriptors: Higher Education, Federal Programs, Government Role, Educational Improvement
Hamblin, David J.; Phoenix, David A. – Journal of Higher Education Policy and Management, 2012
There are increasing demands for higher levels of data assurance in higher education. This paper explores some of the drivers for this trend, and then explains what stakeholders mean by the concept of data assurance, since this has not been well defined previously. The paper captures insights from existing literature, stakeholders, auditors, and…
Descriptors: Higher Education, Educational Technology, Stakeholders, Quality Assurance
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers