NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 16 to 30 of 160 results Save | Export
Kaczmarek, Joanne – EDUCAUSE, 2014
The expanding scope of IT initiatives in higher education institutions now goes well beyond basic desktop and enterprise applications. IT is often asked to focus on efforts to establish good information-governance practices. The many aspects of information governance are often found in a records and information management (RIM) program, but not…
Descriptors: Governance, Information Management, Information Policy, Program Administration
Data Quality Campaign, 2014
High education expectations--and the tools to ensure that they are being met--empower educators, students, parents, and policymakers to support student learning and make the best decisions to improve education. Most states have voluntarily adopted the Common Core State Standards to serve as their education expectations. To consistently and…
Descriptors: State Standards, Consortia, Organizational Theories, Data Collection
Data Quality Campaign, 2014
Growing state and district use of education data and increased public attention to the ways in which these data are collected, used, managed, and disclosed have sparked conversation on the value of data and how they are protected. Student data (e.g., demographics, transcripts, attendance, test scores, outcomes, etc.) are an important tool for…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Data Quality Campaign, 2014
Local school board members need to be able to access and use high-quality data to make good decisions. Often this data is collected and stored locally, but information that is publicly reported by the state can provide additional value. Most state public reporting is designed to serve information needs, and are geared toward compliance with state…
Descriptors: Boards of Education, Access to Information, Decision Making, State Action
Data Quality Campaign, 2015
Last year, growing state and district use of education data and increased public attention to the ways in which these data are collected, used, managed, and disclosed sparked much conversation in statehouses around the country about the value of data and how they are protected. Student data (e.g., demographics, transcripts, attendance, test…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Privacy Technical Assistance Center, 2017
Educational authorities and policymakers are increasingly focused on protecting student privacy while using data to inform program and policy decisions. Data from more than one government agency is often analyzed to more holistically inform these decisions. This has led to the development of integrated data systems (IDSs) that allow linkage of…
Descriptors: Privacy, Information Systems, Database Management Systems, Program Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Fritch, Melia; Pitts, Joelle E. – Journal of Electronic Resources Librarianship, 2016
The authors discuss the long-term accumulation of unstandardized and inaccessible content within the Libguides system and the decision-making process to create and implement a set of standards using the migration to the LibGuides2 platform as a vehicle for change. Included in the discussion are strategies for the creation of standards and…
Descriptors: Standard Setting, Information Policy, Compliance (Legal), Change Strategies
Schaffhauser, Dian – Campus Technology, 2013
The pendulum of technology control in higher education has swung away from central IT toward the users. It has become easier for individuals and departments to find their own computing solutions via mobile apps, the cloud, BYOD, web services, and other means. As a result, IT can often find itself out of the loop in certain technology decisions.…
Descriptors: Information Technology, Information Management, Information Policy, Campuses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McKelvey, Nigel – International Journal of Evaluation and Research in Education, 2014
Adhering to laws whilst working or studying in an educational establishment is often fraught with challenges. The Irish Data Protection Act 1988 (Amendment 2003) strives to protect the individual where their personal data is potentially being abused. The advancements in technologies have facilitated educational establishments by improving…
Descriptors: Higher Education, Information Security, Information Policy, Technological Advancement
Data Quality Campaign, 2014
District and state data systems are constructed to ensure that individuals can access only the data that are appropriate for their role. Still, questions from the public about how these data systems work and how student privacy is protected have been increasing. A recurring concern is the feared existence of a "permanent record"--a…
Descriptors: Data Collection, Student Records, Data Processing, Access to Information
Schaffhauser, Dian – Campus Technology, 2013
For any institution looking to shift enterprise resource planning (ERP) systems to the cloud, big savings can be achieved--but only if the school has properly prepped "before" negotiations begin. These three steps can help: (1) Mop up the mess first; (2) Understand the true costs for services; and (3) Calculate the cost of transition.
Descriptors: Cost Effectiveness, Information Management, Information Policy, Technology Planning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
Otero, Angel R. – ProQuest LLC, 2014
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
Descriptors: Information Security, Information Policy, Quality Control, Quality Assurance
Data Quality Campaign, 2015
States are uniquely positioned to provide feedback to teacher preparation programs (TPPs) on the effectiveness of the teachers they train, and to provide information about the quality of TPPs to the public. States have been building the significant data capacity to reliably and securely link teachers with their students' achievement and growth…
Descriptors: Data, Quality Assurance, Feedback (Response), Teacher Education Programs
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11