NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 91 to 105 of 903 results Save | Export
Data Quality Campaign, 2015
Last year, growing state and district use of education data and increased public attention to the ways in which these data are collected, used, managed, and disclosed sparked much conversation in statehouses around the country about the value of data and how they are protected. Student data (e.g., demographics, transcripts, attendance, test…
Descriptors: Privacy, State Legislation, Student Records, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ahmed, Rida – Journal of Education and Educational Development, 2016
This paper investigates the adequacy of social media implementation in the context of secondary education in Pakistan and highlights the importance and necessity of social media in secondary education. This research has helped in understanding the pros and cons of social media implementation in classrooms and also facilitated in analyzing whether…
Descriptors: Foreign Countries, Social Media, Program Implementation, Classroom Techniques
Hargreaves, Jo – National Centre for Vocational Education Research (NCVER), 2016
This report assesses the impact of the National Centre for Vocational Education Research's (NCVER) research against two themes: the role of apprenticeships in a modern economy (focusing on work relating to completions) and the nature of the vocations and competencies required by industry. The evaluation spans work published from 2005 to 2015 and…
Descriptors: Apprenticeships, Research Utilization, Educational Policy, Educational Practices
Privacy Technical Assistance Center, 2017
Educational authorities and policymakers are increasingly focused on protecting student privacy while using data to inform program and policy decisions. Data from more than one government agency is often analyzed to more holistically inform these decisions. This has led to the development of integrated data systems (IDSs) that allow linkage of…
Descriptors: Privacy, Information Systems, Database Management Systems, Program Evaluation
Higher Education Funding Council for England, 2017
Since September 2016, "relevant higher education bodies" have been subject under the Counter Terrorism and Security Act 2015 to a statutory duty to have due regard to the need to prevent people from being drawn into terrorism. In doing so, they must have particular regard to their existing duties to ensure freedom of speech and consider…
Descriptors: Foreign Countries, Progress Monitoring, Terrorism, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Washington, Edwina Thomas – Adult Learning, 2015
Bullying is a social problem. The proliferation of electronic technology has provided a new forum for bullies to harm victims. That is, bullies can transmit harmful text messages, photos, or video over the Internet and other digital communication devices to victims. This malpractice of technology-oriented phenomenon known as cyberbullying has…
Descriptors: Higher Education, Bullying, Social Networks, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Fritch, Melia; Pitts, Joelle E. – Journal of Electronic Resources Librarianship, 2016
The authors discuss the long-term accumulation of unstandardized and inaccessible content within the Libguides system and the decision-making process to create and implement a set of standards using the migration to the LibGuides2 platform as a vehicle for change. Included in the discussion are strategies for the creation of standards and…
Descriptors: Standard Setting, Information Policy, Compliance (Legal), Change Strategies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Johri, Aditya; Yang, Seungwon; Vorvoreanu, Mihaela; Madhavan, Krishna – Advances in Engineering Education, 2016
As part of our NSF funded collaborative project on Data Sharing within Engineering Education Community, we conducted an empirical study to better understand the current climate of data sharing and participants' future expectations of the field. We present findings of this mixed method study and discuss implications. Overall, we found strong…
Descriptors: Engineering Education, Data, Knowledge Management, Educational Practices
Schaffhauser, Dian – Campus Technology, 2013
The pendulum of technology control in higher education has swung away from central IT toward the users. It has become easier for individuals and departments to find their own computing solutions via mobile apps, the cloud, BYOD, web services, and other means. As a result, IT can often find itself out of the loop in certain technology decisions.…
Descriptors: Information Technology, Information Management, Information Policy, Campuses
Canadian Association of University Teachers, 2013
The Canadian Association of University Teachers (CAUT) represents over 65,000 university and college teachers, academic librarians, researchers and professional and general staff at more than 120 universities and colleges from every province. The association's members both create and use copyright material; they require copyright law that protects…
Descriptors: Foreign Countries, Copyrights, College Faculty, Teacher Associations
Edwards, Charles K. – ProQuest LLC, 2013
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Descriptors: Governance, Information Security, Models, Compliance (Legal)
Boden, Joshua M. – ProQuest LLC, 2017
As social technologies become more integrated into students' lives, new means of communication have emerged, along with novel problem behaviors with significant consequences for students' well-being. One of these is the sending of sexualized images via cell phone, referred to as "sexting." An understanding of how and why some students…
Descriptors: Social Media, Mass Media Use, Mass Media Effects, Behavior Problems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McKelvey, Nigel – International Journal of Evaluation and Research in Education, 2014
Adhering to laws whilst working or studying in an educational establishment is often fraught with challenges. The Irish Data Protection Act 1988 (Amendment 2003) strives to protect the individual where their personal data is potentially being abused. The advancements in technologies have facilitated educational establishments by improving…
Descriptors: Higher Education, Information Security, Information Policy, Technological Advancement
Peer reviewed Peer reviewed
Direct linkDirect link
Freedman, Gordon – Policy Futures in Education, 2014
The information giants, Google being the largest, trade every day and build high-valuation mega-opolies on the back of very personal information without including their sources of value with any tangible return for their investment of exclusive data. The time has come to ask the question whether the grand bargain of "cool tools" in…
Descriptors: Information Policy, Confidential Records, Confidentiality, Electronic Libraries
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  61