Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 24 |
Descriptor
Source
Author
Publication Type
Journal Articles | 14 |
Reports - Descriptive | 12 |
Reports - Evaluative | 5 |
Dissertations/Theses -… | 4 |
Reports - Research | 2 |
Books | 1 |
Collected Works - General | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 9 |
Elementary Secondary Education | 8 |
Two Year Colleges | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Media Staff | 1 |
Researchers | 1 |
Location
California | 3 |
Illinois | 3 |
New York | 3 |
District of Columbia | 2 |
Georgia | 2 |
Massachusetts | 2 |
Pennsylvania | 2 |
Rhode Island | 2 |
Australia | 1 |
Colorado | 1 |
Idaho | 1 |
More ▼ |
Laws, Policies, & Programs
No Child Left Behind Act 2001 | 2 |
American Recovery and… | 1 |
Elementary and Secondary… | 1 |
Elementary and Secondary… | 1 |
Family Educational Rights and… | 1 |
Race to the Top | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Hartong, Sigrid – European Educational Research Journal, 2016
The past few decades have witnessed a global enforcement of "governance by data" in education policy, including a significant increase of assessments and quantified evaluation. Within this context, this article focuses particularly on the intensifying evolvement of new (digital) information technologies and "mediated"…
Descriptors: Data, Decision Making, Management Information Systems, Information Utilization
Borkovich, Debra J.; Noah, Philip D. – Information Systems Education Journal, 2014
Big Data are structured, semi-structured, unstructured, and raw data that are revolutionizing how we think about and use information in the 21st century. Big Data represents a paradigm shift from our prior use of traditional data assets over the past 30+ years, such as numeric and textual data, to generating and accessing petabytes and beyond of…
Descriptors: Data, Theories, Business, Information Science
Carley, Maureen; Babb, Jeffry – Information Systems Education Journal, 2015
The digital revolution is upon us, bringing with it disruptive forces in every aspect of business and personal interactions. The business marketing function has become so technologically driven it is sometimes hard to tell where the boundaries between the Marketing and Information Systems disciplines lie. The new world of digital marketing has…
Descriptors: Marketing, Information Systems, Interdisciplinary Approach, Information Technology
Miller, Amalia R.; Tucker, Catherine E. – Journal of Policy Analysis and Management, 2011
Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that…
Descriptors: Computer Security, Patients, Data, Hospitals
Fielding, Nigel G. – Journal of Mixed Methods Research, 2012
Data integration is a crucial element in mixed methods analysis and conceptualization. It has three principal purposes: illustration, convergent validation (triangulation), and the development of analytic density or "richness." This article discusses such applications in relation to new technologies for social research, looking at three…
Descriptors: Mixed Methods Research, Innovation, Information Technology, Data
Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This call for action addresses the high-level benefits of adopting a university-wide policy regarding research data management. It identifies the various university stakeholders and suggests that the library initiate a conversation among them in order to get buy-in for a proactive, rather than reactive, high-level policy for responsible data…
Descriptors: Academic Libraries, Higher Education, Information Technology, Foreign Countries
Ayyagari, Ramakrishna; Tyks, Jonathan – Journal of Information Technology Education: Innovations in Practice, 2012
Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…
Descriptors: Information Technology, Information Systems, Core Curriculum, Information Security
Jacobs, James Jay – ProQuest LLC, 2009
Data compression is the art of using encoding techniques to represent data symbols using less storage space compared to the original data representation. The encoding process builds a relationship between the entropy of the data and the certainty of the system. The theoretical limits of this relationship are defined by the theory of entropy in…
Descriptors: Information Systems, Scientific Concepts, Data, Coding
Allendoerfer, Kenneth Robert – ProQuest LLC, 2009
User-centered evaluations of information systems often focus on the usability of the system rather its usefulness. This study examined how a using an interactive knowledge-domain visualization (KDV) system affected users' understanding of a domain. Interactive KDVs allow users to create graphical representations of domains that depict important…
Descriptors: Visualization, Information Systems, Artificial Intelligence, Multidimensional Scaling
Grayson, Katherine – Campus Technology, 2010
Ever since the first customer relationship management (CRM) tools found their way onto North American campuses around 2002, higher education administrators have cringed at the mention of the word "customer," preferring to substitute "constituent" for the more sales-driven term. Yet, with competition for qualified candidates…
Descriptors: Outreach Programs, Student Personnel Services, School Holding Power, Learner Engagement
Yares, Ali Chava Kaufman – ProQuest LLC, 2010
Information is everywhere and finding the best method to manage it is a problem that all types of organizations have to deal with. Schools use Student Information Systems (SIS) to manage Student Data, Financial Information, Development, Human Resources, Admission, Financial Aid, Enrollment, Scheduling, and Health Information. A survey of 107…
Descriptors: Private Schools, Education, Information Systems, Databases
Ashraf, Tariq, Ed.; Sharma, Jaideep, Ed.; Gulati, Puja Anand, Ed. – Information Science Publishing, 2010
The increasing prevalence of digital information systems and technologies compels libraries across the globe to update systems and provide users with a digital experience outside the confines of the structural library, providing useful benefits to the user while creating new areas of concern such as digital information preservation.…
Descriptors: Preservation, Copyrights, Information Systems, Electronic Libraries
Tucker, Bill – Education Sector, 2010
Over the past decade, school districts and states have made impressive advances in collecting and managing data used for accountability purposes. By the year 2011, all 50 states will have systems to track students from year to year. But in most states and districts, all the data generated by these systems flows only one way: up. This paper…
Descriptors: Evidence, Educational Objectives, Outcomes of Education, Educational Change
Lillibridge, Fred – New Directions for Community Colleges, 2008
This chapter presents a sophisticated approach for tracking student cohorts from entry through departure within an institution. It describes how a researcher can create a student tracking model to perform longitudinal research on student cohorts. (Contains 3 tables and 2 figures.)
Descriptors: Academic Persistence, Longitudinal Studies, Models, Research Methodology
Previous Page | Next Page ยป
Pages: 1 | 2