NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 31 to 45 of 66 results Save | Export
US Government Accountability Office, 2016
Enacted in 2014, the Workforce Innovation and Opportunity Act (WIOA) brought numerous changes to existing federal employment and training programs, including requiring the Department of Labor (DOL) and the Department of Education (Education) to implement a common performance accountability system across the six WIOA-designated core programs. WIOA…
Descriptors: Federal Legislation, Legislators, Accountability, Job Training
Data Quality Campaign, 2015
Last year, growing state and district use of education data and increased public attention to the ways in which these data are collected, used, managed, and disclosed sparked much conversation in statehouses around the country about the value of data and how they are protected. Student data (e.g., demographics, transcripts, attendance, test…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Johri, Aditya; Yang, Seungwon; Vorvoreanu, Mihaela; Madhavan, Krishna – Advances in Engineering Education, 2016
As part of our NSF funded collaborative project on Data Sharing within Engineering Education Community, we conducted an empirical study to better understand the current climate of data sharing and participants' future expectations of the field. We present findings of this mixed method study and discuss implications. Overall, we found strong…
Descriptors: Engineering Education, Data, Knowledge Management, Educational Practices
Edwards, Charles K. – ProQuest LLC, 2013
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Descriptors: Governance, Information Security, Models, Compliance (Legal)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McKelvey, Nigel – International Journal of Evaluation and Research in Education, 2014
Adhering to laws whilst working or studying in an educational establishment is often fraught with challenges. The Irish Data Protection Act 1988 (Amendment 2003) strives to protect the individual where their personal data is potentially being abused. The advancements in technologies have facilitated educational establishments by improving…
Descriptors: Higher Education, Information Security, Information Policy, Technological Advancement
Peer reviewed Peer reviewed
Direct linkDirect link
Freedman, Gordon – Policy Futures in Education, 2014
The information giants, Google being the largest, trade every day and build high-valuation mega-opolies on the back of very personal information without including their sources of value with any tangible return for their investment of exclusive data. The time has come to ask the question whether the grand bargain of "cool tools" in…
Descriptors: Information Policy, Confidential Records, Confidentiality, Electronic Libraries
Data Quality Campaign, 2014
District and state data systems are constructed to ensure that individuals can access only the data that are appropriate for their role. Still, questions from the public about how these data systems work and how student privacy is protected have been increasing. A recurring concern is the feared existence of a "permanent record"--a…
Descriptors: Data Collection, Student Records, Data Processing, Access to Information
Otero, Angel R. – ProQuest LLC, 2014
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
Descriptors: Information Security, Information Policy, Quality Control, Quality Assurance
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Molnar, Alex; Boninger, Faith – National Education Policy Center, 2015
Computer technology has made it possible to aggregate, collate, analyze, and store massive amounts of information about students. School districts and private companies that sell their services to the education market now regularly collect such information, raising significant issues about the privacy rights of students. Most school districts lack…
Descriptors: Privacy, Information Security, Data, Student Records
Canadian Association of University Teachers, 2015
Bill C-51, the Canadian federal government's "Anti-Terrorism Act," has sparked serious concerns about the potential impact on the basic civil liberties of all Canadians. The proposed legislation would establish criminal offences that infringe upon the right to free expression. Security agencies would be granted unprecedented and…
Descriptors: Academic Freedom, Freedom of Speech, Campuses, College Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Hohnle, Steffen; Michel, Boris; Glasze, Georg; Uphues, Rainer – International Research in Geographical and Environmental Education, 2013
Young people in modern societies consciously (e.g. Facebook) or unconsciously (e.g. some Google services) produce a vast amount of geodata. Using relational databases, private companies are capable of creating very precise profiles of the individual user and his/her spatial practices from this data. This almost inevitably prompts questions…
Descriptors: Information Security, Geography, Privacy, Geography Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Achinewhu-Nworgu, Elizabeth; Azaiki, Steve; Nworgu, Queen Chioma – Bulgarian Comparative Education Society, 2016
This paper aims to present the role, values, and legal policy issues facing public Library resources in supporting students to achieve academic success. Research indicates that majority of people that own or work in the Library tend to ignore some of the vital roles, values and legal policy issues paramount to libraries. Some of these issues are…
Descriptors: Public Libraries, Library Materials, Academic Achievement, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Andrew Hope – Discourse: Studies in the Cultural Politics of Education, 2015
The introduction of widespread school Internet access in industrialised countries has been accompanied by the materialisation of what can be labelled as a national school e-safety agenda. Drawing upon Foucault's notions of discourse and governmentality, this paper explores how e-safety policy documents serve to constrain the conceptual…
Descriptors: Policy Analysis, Information Policy, Information Security, Social Control
Pages: 1  |  2  |  3  |  4  |  5