Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 18 |
Since 2006 (last 20 years) | 91 |
Descriptor
Information Management | 160 |
Information Policy | 160 |
Access to Information | 65 |
Information Technology | 50 |
Privacy | 40 |
Student Records | 31 |
Foreign Countries | 28 |
Information Security | 27 |
Information Systems | 25 |
Information Utilization | 24 |
Higher Education | 23 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 36 |
Elementary Secondary Education | 24 |
Postsecondary Education | 16 |
Adult Education | 12 |
Secondary Education | 2 |
Adult Basic Education | 1 |
Early Childhood Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Location
United Kingdom | 6 |
United States | 6 |
Canada | 5 |
Australia | 4 |
Florida | 3 |
New Zealand | 2 |
United Kingdom (London) | 2 |
Virginia | 2 |
Bangladesh | 1 |
California | 1 |
China | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian – RAND Corporation, 2009
This briefing paper captures the key findings and recommendations of a study commissioned by the Joint Information Systems Committee on aspects of the strategic commitment of institutions to repository sustainability. This project, labelled EMBRACE (EMBedding Repositories And Consortial Enhancement), is aimed at enhancing the functionality,…
Descriptors: Higher Education, Information Systems, Electronic Libraries, Foreign Countries
Tirgari, Vesal – ProQuest LLC, 2010
The phenomenological study explored the lived experiences and perceptions of a purposive sample of 20 IT professionals (managers, engineers, administrators, and analysts) in the state of Virginia, Texas, and Washington DC. The focus of this research study was to learn the perceptions of IT professionals who are or once were in a decision-making…
Descriptors: Information Technology, Professional Personnel, Attitudes, Phenomenology
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Center for the Future of Teaching and Learning, 2010
When a child is placed in the state's foster care system because of a parent's abuse or neglect, the state--represented by teams of social workers, lawyers, judges, foster parents, and other caregivers or guardians--steps into many aspects of the parental role. Too often, though, the state's representatives are attempting to fulfill a parental…
Descriptors: Child Welfare, Social Work, Foster Care, Public Policy
British Columbia Ministry of Education, 2014
This handbook outlines procedures for sharing student data between schools and the Ministry of Education, and answers questions pertaining to provincial examinations. It supports the work of both educators and the Ministry, which works with schools to produce transcripts and administer provincial exams. The following are appended: (1) Forms; and…
Descriptors: Student Records, Access to Information, Disclosure, Information Dissemination
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Guernsey, Lisa – Chronicle of Higher Education, 2008
Colleges capture a slew of highly sensitive information on everyone on campus. While chief privacy officer has become a recognized title in the corporate world, higher education seems slow to pick up on the trend--a reluctance that could represent either head-in-the-sand thinking or fiscally prudent avoidance of bureaucratic bloat. This article…
Descriptors: Higher Education, Information Management, Information Policy, Confidential Records
Wu, Yuehua – ProQuest LLC, 2010
The development and diffusion of information and communication technologies, particularly the internet, creates a worldwide trend of using ICTs and the internet to deliver public services. This new form of electronic administration--e-government--potentially offers great benefits to society in that it can enhance public service efficiency,…
Descriptors: Foreign Countries, Governance, Information Dissemination, Telecommunications
Melvin, Valerie C. – US Government Accountability Office, 2010
Federal agencies are increasingly using electronic means to create, exchange, and store information, and in doing so, they frequently create federal records: that is, information, in whatever form, that documents government functions, activities, decisions, and other important transactions. As the volume of electronic information grows, so does…
Descriptors: Information Management, Electronic Publishing, Administrator Responsibility, Government Publications
US Department of Education, 2010
The Chief Information Officer (CIO) at the U.S. Department of Education (the Department) has primary responsibility to ensure that Information Technology (IT) is acquired and information resources are managed in a manner consistent with statutory, regulatory, and Departmental requirements and priorities. This Department Information Resources…
Descriptors: Strategic Planning, Information Management, Information Technology, Organizational Objectives
Dorner, Daniel G. – Government Information Quarterly, 2009
Recent legislation in New Zealand has placed statutory obligations on its government organizations to introduce sound records management practices and to ensure long-term access to their digital records. To obtain a base level of knowledge on current digital preservation practices and on awareness of digital preservation issues, an online survey…
Descriptors: Preservation, Knowledge Level, Information Management, Innovation
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
McClanahan, Kitty – Bulletin of Science, Technology & Society, 2008
Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…
Descriptors: Medical Services, Medical Education, Privacy, Confidential Records
Kennedy, Patricia – Australian Library Journal, 2008
This paper is a discussion of the use of metadata, in its various manifestations, to access information. Information management standards are discussed. The connection between the ancient world and the modern world is highlighted. Individual perspectives are paramount in fulfilling information seeking. Metadata is interpreted and reflected upon in…
Descriptors: Information Management, Information Seeking, Metadata, Internet