NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Staci L. Morris; Robbert J. Langwerden; Eric F. Wagner; Michelle M. Hospital – Journal of American College Health, 2024
Alcohol and other drug (AOD) use problems among college students continue to represent a public health epidemic. In 2019, historically high rates of binge-drinking and marijuana use were reported among college-age adults, and the detrimental effects of excessive AOD use in college, such as poorer academic performance, sexual assault, injury or…
Descriptors: Program Implementation, Intervention, Drinking, Drug Use
British Columbia Council on Admissions and Transfer, 2021
This report focuses on data governance at post-secondary institutions and related organizations. Data governance is defined as the formal execution and enforcement of authority over the management of data and data-related assets (Seiner, 2014). An overview of data governance at higher education institutions provides detail on elements of data…
Descriptors: Foreign Countries, Data, Governance, Postsecondary Education
US Department of Education, 2009
Because of recent violent crimes, natural disasters, and other emergencies or crises, colleges and universities are convening committees and task forces to reexamine or conduct a comprehensive review of policies, procedures, and systems related to campus safety and security. As with many critical areas on the agendas of administrators, campus…
Descriptors: Higher Education, Emergency Programs, Crisis Management, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy