NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 286 to 300 of 903 results Save | Export
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Peer reviewed Peer reviewed
Direct linkDirect link
Alfaro, Ignacio J.; Boullosa, Alfredo Perez; Andreu-Beso, J. Vicente; De Lamo, Jose; Sobrado, Luis; Sanz, Rafael; Arias, Jose M. – Higher Education in Europe, 2009
The London Communique of the Conference of Ministers responsible for Higher Education in the countries participating in the Bologna Process (2007) emphasized as priorities for 2009 the "action taken at national level to promote the mobility of students and staff, including measures for future evaluation". Certain responsibilities are…
Descriptors: Student Attitudes, Universities, Foreign Countries, Student Mobility
Peer reviewed Peer reviewed
Direct linkDirect link
Simes, Laura; Pymm, Bob – Journal of Web Librarianship, 2009
Selective archiving of Web sites in Australia has been under way since 1996. This approach has seen carefully selected sites preserved after site owners granted permission. The labor-intensive nature of this process means only a small number of sites can ever be acquired in this manner. An alternate approach is an automated…
Descriptors: Legal Problems, Copyrights, Foreign Countries, Archives
Guernsey, Lisa – Chronicle of Higher Education, 2008
Colleges capture a slew of highly sensitive information on everyone on campus. While chief privacy officer has become a recognized title in the corporate world, higher education seems slow to pick up on the trend--a reluctance that could represent either head-in-the-sand thinking or fiscally prudent avoidance of bureaucratic bloat. This article…
Descriptors: Higher Education, Information Management, Information Policy, Confidential Records
Dow, Mirah – School Library Media Activities Monthly, 2008
The American Association of School Librarians "Standards for the 21st Century Learner" (2007) expresses nine fundamental common beliefs. One of these beliefs is that "ethical behavior in the use of information must be taught" (AASL 2007, 1). It is important for library media specialists to understand that teaching ethical behavior is much more…
Descriptors: School Libraries, Media Specialists, Teaching Methods, Ethical Instruction
Advisory Committee on Student Financial Assistance, 2013
The Advisory Committee was created by Congress in the "Higher Education Amendments of 1986" to be an independent and nonpartisan source of knowledge, advice, and counsel to Congress and the Secretary of Education on federal, state, and institutional postsecondary student assistance. One of the most important analytical directives in the…
Descriptors: Student Financial Aid, Low Income Groups, College Graduates, Graduation Rate
Peer reviewed Peer reviewed
Direct linkDirect link
Torres, Mario Sergio; Collier, Virginia; Tolson, Homer; Huang, Tse-Yang – Current Issues in Education, 2010
This study examined the extent to which Texas school boards of education made efforts to locally modify student speech policy. Using online policy manuals provided by the Texas Association of School Boards, speech policies for 91 school districts were gathered using a purposive stratified sampling procedure and examined for local modifications to…
Descriptors: Freedom of Speech, Constitutional Law, Boards of Education, Geographic Location
Wu, Yuehua – ProQuest LLC, 2010
The development and diffusion of information and communication technologies, particularly the internet, creates a worldwide trend of using ICTs and the internet to deliver public services. This new form of electronic administration--e-government--potentially offers great benefits to society in that it can enhance public service efficiency,…
Descriptors: Foreign Countries, Governance, Information Dissemination, Telecommunications
Melvin, Valerie C. – US Government Accountability Office, 2010
Federal agencies are increasingly using electronic means to create, exchange, and store information, and in doing so, they frequently create federal records: that is, information, in whatever form, that documents government functions, activities, decisions, and other important transactions. As the volume of electronic information grows, so does…
Descriptors: Information Management, Electronic Publishing, Administrator Responsibility, Government Publications
Peer reviewed Peer reviewed
Direct linkDirect link
Garbutt, Ruth – Disability & Society, 2009
This article addresses some of the difficulties inherent in disseminating emancipatory research findings in academic journals in a way that is empowering to people with learning difficulties in the UK. It calls for academics to challenge the editorial criteria of academic journals to consider accepting articles written in a more accessible style.…
Descriptors: Learning Problems, Mental Retardation, Access to Information, Journal Articles
Peer reviewed Peer reviewed
Direct linkDirect link
Lewis, Stuart; Hayes, Leonie; Newton-Wade, Vanessa; Corfield, Antony; Davis, Richard; Donohue, Tim; Wilson, Scott – Program: Electronic Library and Information Systems, 2009
Purpose: The purpose of this paper is to describe the repository deposit protocol, Simple Web-service Offering Repository Deposit (SWORD), its development iteration, and some of its potential use cases. In addition, seven case studies of institutional use of SWORD are provided. Design/methodology/approach: The paper describes the recent…
Descriptors: Case Studies, Standards, Web Sites, Information Policy
US Department of Education, 2010
The Chief Information Officer (CIO) at the U.S. Department of Education (the Department) has primary responsibility to ensure that Information Technology (IT) is acquired and information resources are managed in a manner consistent with statutory, regulatory, and Departmental requirements and priorities. This Department Information Resources…
Descriptors: Strategic Planning, Information Management, Information Technology, Organizational Objectives
Bronte-Tinkew, Jacinta; Allen, Tiffany; Joyner, Krystle – Child Trends, 2008
Many out-of-school time programs conduct evaluations. As part of an evaluation, program participants (including children, their parents, and program staff) may be asked to provide information. Researchers refer to these individuals as "human subjects," and it is essential to protect their privacy, rights, confidentiality, and privileges.…
Descriptors: Confidentiality, After School Programs, Institutional Research, Institutional Characteristics
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Wolf, Sara – Library Media Connection, 2008
Access to information is an essential art of the educational system. The reality is, however, that there are laws and policies in effect that can restrict what information is available to students and teachers in K-12 schools. Selection policies, Acceptable Use Policies, Circulation Policies, as well as federal laws and acts, all place…
Descriptors: Intellectual Freedom, Access to Information, Elementary Secondary Education, School Libraries
Pages: 1  |  ...  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  ...  |  61