Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 18 |
Descriptor
Computer Software | 39 |
Student Records | 39 |
Higher Education | 17 |
Elementary Secondary Education | 9 |
Databases | 8 |
Educational Technology | 8 |
Recordkeeping | 7 |
Computer Oriented Programs | 6 |
Internet | 6 |
Microcomputers | 6 |
Privacy | 6 |
More ▼ |
Source
Author
Smith, Brent | 2 |
Adams Becker, S. | 1 |
Allison, Colin | 1 |
Arora, Jessie | 1 |
Barbour, Andrew | 1 |
Beck, Katie | 1 |
Berkowitz, Gary | 1 |
Beverly, Donald | 1 |
Bickers, Doyle | 1 |
Bienkowski, Marie | 1 |
Bitter, Barbara W. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 39 |
Journal Articles | 24 |
Speeches/Meeting Papers | 5 |
Guides - Non-Classroom | 4 |
Collected Works - Proceedings | 1 |
Guides - General | 1 |
Information Analyses | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 8 |
Elementary Secondary Education | 5 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Practitioners | 6 |
Administrators | 5 |
Counselors | 1 |
Teachers | 1 |
Location
New York | 3 |
Alabama | 1 |
Canada | 1 |
Connecticut | 1 |
Illinois | 1 |
Iran | 1 |
Kansas | 1 |
New Jersey | 1 |
United Kingdom (Great Britain) | 1 |
United Kingdom (Scotland) | 1 |
United States | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Meadows, Lynne P.; Griffin, Connie; Luna, Francis; Maughan, Erin; Peiffer, Cheryl; Wysocki, Regina – National Association of School Nurses, 2019
It is the position of the National Association of School Nurses (NASN) that all registered professional school nurses (hereinafter referred to as school nurses) should have access to a software platform for student electronic health records (EHRs) that includes nursing language/medical terminology and complies with standards of confidentiality,…
Descriptors: School Nurses, Computer Software, Student Records, Information Management
Kisling, Reid; Peterson, Andrew; Nisbet, Robert – Strategic Enrollment Management Quarterly, 2021
Data analytics is undergoing an evolution through effective data use to support both operational and learning analytics models. However, this evolution will require that institutional leaders transform their data systems to best support the needs of application modeling and use their intuition to help drive the development of better analytical…
Descriptors: Higher Education, Learning Analytics, Models, Instructional Leadership
Gordon, Jerry; Hayden, Trey; Johnson, Andy; Smith, Brent – Advanced Distributed Learning Initiative, 2020
The DoD's [Department of Defense's] Advanced Distributed Learning (ADL) Initiative is designing a framework of commercial standards, technical specifications, and business rules to enable plug and play interoperability of learning technologies. The Total Learning Architecture (TLA) framework will allow education and training products to…
Descriptors: Armed Forces, Military Training, Educational Technology, Delivery Systems
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Smith, Brent; Milham, Laura – Advanced Distributed Learning Initiative, 2021
Since 2016, the Advanced Distributed Learning (ADL) Initiative has been developing the Total Learning Architecture (TLA), a 4-pillar data strategy for managing lifelong learning. Each pillar describes a type of learning-related data that needs to be captured, managed, and shared across an organization. Each data pillar is built on a set of…
Descriptors: Learning Analytics, Computer Software, Metadata, Learning Activities
Rodafinos, Angelos – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Aim/Purpose: This paper presents some of the issues that academia faces in both the detection of plagiarism and the aftermath. The focus is on the latter, how academics and educational institutions around the world can address the challenges that "follow" the identification of an incident. The scope is to identify the need for and…
Descriptors: Plagiarism, Intervention, Prevention, Higher Education
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Privacy Technical Assistance Center, 2014
Today's classrooms increasingly employ on-demand delivery of personalized content, virtual forums for interacting with other students and teachers, and a wealth of other interactive technologies that help foster and enhance the learning process. Online forums help teachers share lesson plans; social media help students collaborate across…
Descriptors: Privacy, Information Security, Online Systems, Internet
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Bienkowski, Marie; Gerard, Sarah Nixon; Rubin, Shawn; Sanford, Cathy; Borrelli-Murray, Dana; Driscoll, Tom; Arora, Jessie; Hruska, Mike; Beck, Katie; Murray, Thomas; Hoekstra, Jason; Gannes, Stuart; Metz, Edward; Midgley, Steve; Castilla, Stephanie; Tomassini, Jason; Madda, Mary Jo; Chase, Zac; Martin, Erik; Noel, Marcus; Styles, Kathleen – Office of Educational Technology, US Department of Education, 2015
Opportunities abound for software designers and developers to create impactful tools for teachers, school leaders, students, and their families. This guide for developers, startups, and entrepreneurs addresses key questions about the education ecosystem and highlights critical needs and opportunities to develop digital tools and apps for learning.…
Descriptors: Computer Software, Design, Technology Uses in Education, Educational Technology
Johnson, L.; Adams Becker, S.; Estrada, V.; Freeman, A. – New Media Consortium, 2014
"The NMC Horizon Report" series is the most visible outcome of the New Media Consortium (NMC) Horizon Project, an ongoing research effort established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within every sector of education in some 65…
Descriptors: Technology Uses in Education, Educational Technology, Elementary Secondary Education, Technological Advancement
McClean, Stephen – Bioscience Education, 2008
Combining the Excel spreadsheet with an email program provides a very powerful tool for sending students personalised emails. Most email clients now support a Mail Merge facility whereby a generic template is created and information unique to each student record in the spreadsheet is filled into that template, generating tens if not hundreds of…
Descriptors: Student Records, Computer Software, Electronic Mail, Worksheets
Foster, Andrea – Chronicle of Higher Education, 2008
At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…
Descriptors: Computer Software, Confidential Records, Student Records, Computer Security
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime
Alabama Department of Education, 2011
This guide is a training and supportive tool for use by local education agencies (LEAs) in the state of Alabama that are utilizing the Science, Technology and Innovation (STI) Information-INow-INFocus information system software. The Graduation Tracking System (GTS) utilizes existing STI technology to capture student information pertaining to…
Descriptors: Guides, Computer Software, Information Management, Student Records