NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)4
Since 2006 (last 20 years)12
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Miah, Shah Jahan; Samsudin, Ahmad Zam Hariro – Education and Information Technologies, 2017
Higher education institutes such as universities suffer from a range of issues in managing their academic records and relevant digital contents. Many universities nowadays use specific software applications for their effective mechanism in records management. The effective provision of enterprises records management (ERM) software for managing…
Descriptors: Academic Records, Information Management, Foreign Countries, Universities
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, LeAnne D. – Topics in Early Childhood Special Education, 2017
Data-driven decision making is central to improving success of children. Actualizing the use of data is challenging when addressing the social, emotional, and behavioral needs of children across different types of early childhood programs (i.e., early childhood special education, early childhood family education, Head Start, and childcare).…
Descriptors: Teamwork, Problem Solving, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Luck, Joe D.; Fulton, John P.; Rees, Jennifer – Journal of Extension, 2015
Three Precision Agriculture Data Management workshops regarding yield monitor data were conducted in 2014, reaching 62 participants. Post-workshop surveys (n = 58) indicated 73% of respondents experienced a moderate to significant increase in knowledge related to yield monitor data usage. Another 72% reported that they planned to utilize best…
Descriptors: Workshops, Data, Database Management Systems, Agricultural Education
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Nelson, Eric Derrand – ProQuest LLC, 2011
This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…
Descriptors: Information Management, Internet, Open Source Technology, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Diamond, Michael; Mattia, Angela – Journal of Instructional Pedagogies, 2017
Data visualization is a key component to business and data analytics, allowing analysts in businesses to create tools such as dashboards for business executives. Various software packages allow businesses to create these tools in order to manipulate data for making informed business decisions. The focus is to examine what skills employers are…
Descriptors: Corporations, Use Studies, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2008
Data integration is one of the single most challenging tasks any district can face. Fortunately for school districts throughout the country with data scattered in disparate systems, an open specification known as the Schools Interoperability Framework (SIF) is mitigating that challenge. SIF has emerged as a cornerstone of K-12 data warehousing,…
Descriptors: Elementary Secondary Education, Computer Software, School Districts, Educational Cooperation
Gray, Peter J. – 1984
This manual on microcomputer-based database management programs provides a description of the key characteristics of database software as well as guidelines for designing a database, uses of database programs, and selecting the right software. Three sets of concepts related to database management are listed and explained: creating a database,…
Descriptors: Computer Software, Data, Data Processing, Databases
Schaffhauser, Dian – Campus Technology, 2009
Using data to track and manage student enrollment is steadily becoming a standard practice on both two-year and four-year campuses. Data mining enables colleges to create predictive models for identifying behaviors that put students at risk for dropping out, flag students who engage in these behaviors, and help identify practices that work in…
Descriptors: Community Colleges, Educational Strategies, Academic Support Services, Attendance Patterns
Peer reviewed Peer reviewed
Direct linkDirect link
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers