NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 46 to 60 of 160 results Save | Export
Data Quality Campaign, 2011
Over the last five years, states have made significant progress implementing statewide longitudinal data systems (SLDS) to collect, store, link and share student-level data. States and the many national organizations supporting their efforts recognized that while building and using these indispensable data systems are important for policy,…
Descriptors: Student Records, Privacy, Information Policy, Confidentiality
Data Quality Campaign, 2014
Education data can empower educators, students, parents, and policymakers with the information they need to make the best decisions to improve student achievement, information that can move the nation toward an education system in which every student graduates prepared for college and career. Safeguarding the privacy of student data is a critical…
Descriptors: Data, Misconceptions, Privacy, Student Records
Peer reviewed Peer reviewed
Direct linkDirect link
Vasileiou, Magdalini; Rowley, Jennifer; Hartley, Richard – British Journal of Educational Technology, 2013
In the very near future, students are likely to expect their universities to provide seamless access to e-books through online library catalogues and virtual learning environments. A paradigm change in terms of the format of books, and especially textbooks, which could have far-reaching impact, is on the horizon. Based on interviews with a number…
Descriptors: Metadata, Access to Information, Electronic Publishing, Electronic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Bess, Donald Arlo – ProQuest LLC, 2012
Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…
Descriptors: Information Security, Organizational Culture, Case Studies, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Emmeline – Journal of Education Policy, 2011
The use of CCTV in schools is now commonplace in the UK. It is estimated that 85% of all UK secondary schools currently have CCTV systems in operation. The introduction of the Data Protection Act 1998 (DPA) (enacted in March 2000) meant that for the first time CCTV had direct legislation governing its use in the UK. This paper attempts to apply…
Descriptors: Foreign Countries, School Safety, Safety Equipment, Law Enforcement
Peer reviewed Peer reviewed
Direct linkDirect link
Hamblin, David J.; Phoenix, David A. – Journal of Higher Education Policy and Management, 2012
There are increasing demands for higher levels of data assurance in higher education. This paper explores some of the drivers for this trend, and then explains what stakeholders mean by the concept of data assurance, since this has not been well defined previously. The paper captures insights from existing literature, stakeholders, auditors, and…
Descriptors: Higher Education, Educational Technology, Stakeholders, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Valeri, Andy – Policy Futures in Education, 2012
This article outlines how providing accessible transparency to information controlled by institutions of power and suppressed from public view is both similar in purpose to, as well as an essential component of, the pedagogical processes promoted by Paulo Freire, which are necessary for the establishment of a truly just and non-oppressive society.…
Descriptors: Access to Information, Information Policy, Freedom of Speech, Censorship
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Dark, Melissa J.; McPherson, Clewin; Troutner, Joanne – Learning & Leading with Technology, 2008
Over the last year, the number of reported cases of confidential information lost because of stolen laptops, lost USB flash drives, misplaced PDAs, and simple human error has significantly increased. These trends have school districts concerned with issues of violating private information. Laws such as the Family Educational Rights and Privacy Act…
Descriptors: Confidentiality, School Districts, Educational Practices, Information Policy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wehrman, Joseph D.; Williams, Rhonda; Field, Julaine; Schroeder, Shanna Dahl – Journal of School Counseling, 2010
This article provides an analysis of important considerations for documentation for school counselors. Although the American School Counseling Association (ASCA) does not provide a national protocol for documentation of school counseling services, the ASCA Ethical guidelines provide insight into ethical record keeping which protects student…
Descriptors: Student Records, Counseling Services, Confidentiality, School Counseling
Raths, David – Campus Technology, 2010
Many chief information officers (CIOs) have come to accept and even embrace the role of outsourcers in their portfolio of IT services. In 2009, 47 percent of the 352 CIOs surveyed by the Center for Higher Education Chief Information Officer Studies (CHECS) said they had selectively outsourced some part of the IT function, up from 43 percent the…
Descriptors: Higher Education, Information Technology, Outsourcing, Strategic Planning
Keller, Josh – Chronicle of Higher Education, 2009
The high price of storing and processing data is hurting colleges and universities across the country. In response, some institutions are embracing greener technologies to keep costs down and help the environment. But compared with other industries, colleges and universities have been slow to understand the problem and to adopt energy-saving…
Descriptors: Energy Management, Cost Effectiveness, Information Services, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Kimball, Michele Bush – Government Information Quarterly, 2011
Although every state in the country has recognized the importance of government transparency by enacting open government provisions, few of those statutes require training programs to encourage records custodians to comply with the law. Ten states mandate training in how to legally respond to public records requests, and some mandates are stronger…
Descriptors: Qualitative Research, Content Analysis, Interviews, Educational Needs
Akpabio, Akpabio Enebong Ema – ProQuest LLC, 2013
Despite huge growth in hospital technology systems, there remains a dearth of literature examining health care administrator's perceptions of the efficacy of interoperable EHR systems. A qualitative research methodology was used in this multiple-case study to investigate the application of diffusion of innovations theory and the technology…
Descriptors: Medical Services, Case Records, Database Management Systems, Adoption (Ideas)
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11