Publication Date
In 2025 | 0 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 23 |
Since 2016 (last 10 years) | 91 |
Since 2006 (last 20 years) | 407 |
Descriptor
Information Policy | 903 |
Access to Information | 368 |
Internet | 210 |
Information Technology | 208 |
Foreign Countries | 181 |
Information Management | 160 |
Privacy | 143 |
Higher Education | 140 |
Copyrights | 103 |
Policy Formation | 91 |
Public Policy | 90 |
More ▼ |
Source
Author
Publication Type
Education Level
Audience
Practitioners | 46 |
Media Staff | 25 |
Policymakers | 22 |
Teachers | 21 |
Administrators | 19 |
Counselors | 7 |
Parents | 6 |
Students | 5 |
Researchers | 4 |
Community | 1 |
Support Staff | 1 |
More ▼ |
Location
United States | 41 |
Canada | 34 |
United Kingdom | 26 |
Australia | 22 |
California | 12 |
New Zealand | 9 |
European Union | 8 |
Netherlands | 8 |
New York | 8 |
China | 6 |
Florida | 6 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Sequential Tests of… | 1 |
What Works Clearinghouse Rating
Data Quality Campaign, 2014
District and state data systems are constructed to ensure that individuals can access only the data that are appropriate for their role. Still, questions from the public about how these data systems work and how student privacy is protected have been increasing. A recurring concern is the feared existence of a "permanent record"--a…
Descriptors: Data Collection, Student Records, Data Processing, Access to Information
Baker, Ryan; Twyman, Janet S. – Center on Innovations in Learning, Temple University, 2016
This field report is the ninth in a series produced by the Center on Innovations in Learning's League of Innovators. The series describes, discusses, and analyzes policies and practices that enable personalization in education. This report introduces sessions from the "Conversations with Innovators" event held at Temple University, June…
Descriptors: Information Technology, Technology Uses in Education, Technology Integration, Educational Improvement
Schaffhauser, Dian – Campus Technology, 2013
For any institution looking to shift enterprise resource planning (ERP) systems to the cloud, big savings can be achieved--but only if the school has properly prepped "before" negotiations begin. These three steps can help: (1) Mop up the mess first; (2) Understand the true costs for services; and (3) Calculate the cost of transition.
Descriptors: Cost Effectiveness, Information Management, Information Policy, Technology Planning
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
Cooper, Amanda – Brock Education: A Journal of Educational Research and Practice, 2015
There are few tools that exist to measure knowledge mobilization (KMb), the process of connecting research to policy and practice across diverse organizations and sectors. This article reports on a comparison of KMb efforts of 105 educational organizations: faculties of education (N = 21), research brokering organizations (N = 44), school…
Descriptors: Schools of Education, Public Agencies, Knowledge Management, Information Dissemination
Smit, D. M. – South African Journal of Education, 2015
Bullying conjures up visions of the traditional schoolyard bully and the subordinate victim. However, bullying is no longer limited to in-person encounter, having come to include cyberbullying, which takes place indirectly over electronic media. In this electronic age, cyber platforms proliferate at an astonishing rate, all attracting the youth in…
Descriptors: Foreign Countries, Bullying, Computer Mediated Communication, Social Media
Chromey, Kelli J.; Duchsherer, Amy; Pruett, Jennifer; Vareberg, Kyle – Educational Media International, 2016
The purpose of this research is to identify the students' perceptions of social media use in a classroom setting. Knowing students' perceptions of social media can help the instructor build a course that both student and teacher can find effective. Using focus groups this study found a model to determine if social media is an appropriate or…
Descriptors: Social Media, Classroom Techniques, Mass Media Use, Student Attitudes
Ololube, Nwachukwu Prince; Agbor, Comfort Nkogho; Major, Nanighe Baldwin; Agabi, Chinyere O.; Wali, Worlu I. – International Journal of Education and Development using Information and Communication Technology, 2016
This research is a continuation of a theoretical review that evaluated ICT Policy Outcomes for National Development in relation to Networked Readiness Index (NRI) and the impact it has on knowledge integration and management in higher education institutions in Nigeria. A new dawn in information technology (IT) has initiated new trends in…
Descriptors: Information Technology, Global Approach, Knowledge Management, Higher Education
Harper, Roosevelt – ProQuest LLC, 2014
This research study examined the specific categories of IT control deficiencies and their related effects on financial reporting. The approach to this study was considered non-experimental, an approach sometimes called descriptive. Descriptive statistics are used to describe the basic features of the data in a study, providing simple summaries…
Descriptors: Disclosure, Corporations, Information Technology, Financial Services
Otero, Angel R. – ProQuest LLC, 2014
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
Descriptors: Information Security, Information Policy, Quality Control, Quality Assurance
Federal Trade Commission, 2012
Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…
Descriptors: Federal Legislation, Records (Forms), Student Records, Confidential Records
Data Quality Campaign, 2015
States are uniquely positioned to provide feedback to teacher preparation programs (TPPs) on the effectiveness of the teachers they train, and to provide information about the quality of TPPs to the public. States have been building the significant data capacity to reliably and securely link teachers with their students' achievement and growth…
Descriptors: Data, Quality Assurance, Feedback (Response), Teacher Education Programs
Isaacs, Albert; Kazembe, Lawrence; Kazondovi, Collins – Higher Education for the Future, 2018
The purpose of this evaluation study was to determine the extent to which the teacher educators in the Faculty of Education at the University of Namibia implemented the national Information and Communication Technology (ICT) Policy for Education. This study employed both the quantitative method in the form of questionnaires and the qualitative…
Descriptors: Foreign Countries, Schools of Education, Information Policy, Educational Policy
Amiel, Tel; Soares, Tiago Chagas – International Review of Research in Open and Distributed Learning, 2016
We present an analysis of 50 repositories for educational content conducted through an "audit system" that helped us classify these repositories, their software systems, promoters, and how they communicated their licensing practices. We randomly accessed five resources from each repository to investigate the alignment of licensing…
Descriptors: Audits (Verification), Educational Resources, Certification, Conflict
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to
the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management