Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Software | 13 |
Privacy | 13 |
Information Management | 12 |
Information Storage | 8 |
Internet | 8 |
Information Technology | 7 |
Users (Information) | 6 |
Computer Security | 5 |
Computers | 5 |
Delivery Systems | 5 |
Higher Education | 5 |
More ▼ |
Source
Author
Adeyeye, Adebisi | 1 |
Agnew, Grace | 1 |
Bennett, Cedric | 1 |
Bristow, Rob | 1 |
Buckman, Joel | 1 |
Czuprynski, Christine N. | 1 |
Dodds, Ted | 1 |
Gil-Garcia, J. Ramon | 1 |
Gold, Stephanie | 1 |
Griffin, Connie | 1 |
Halchin, L. Elaine | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 8 |
Journal Articles | 7 |
Guides - Non-Classroom | 2 |
Collected Works - Proceedings | 1 |
Collected Works - Serials | 1 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 5 |
Elementary Secondary Education | 4 |
Postsecondary Education | 2 |
Audience
Policymakers | 2 |
Location
Australia | 2 |
Florida | 2 |
Netherlands | 2 |
United Kingdom | 2 |
Asia | 1 |
Brazil | 1 |
California (Fresno) | 1 |
Canada | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Equal Access | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Meadows, Lynne P.; Griffin, Connie; Luna, Francis; Maughan, Erin; Peiffer, Cheryl; Wysocki, Regina – National Association of School Nurses, 2019
It is the position of the National Association of School Nurses (NASN) that all registered professional school nurses (hereinafter referred to as school nurses) should have access to a software platform for student electronic health records (EHRs) that includes nursing language/medical terminology and complies with standards of confidentiality,…
Descriptors: School Nurses, Computer Software, Student Records, Information Management
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Council of the Great City Schools, 2017
Equipping today's children with 21st century skills for the digital age requires turning traditional classrooms into a digital-learning ecosystem and ensuring teachers have professional skills and unfettered access to tools they need for 21st century teaching and learning. School district networks are being used for instruction, business, and…
Descriptors: Information Security, Educational Technology, Information Management, Networks
Adeyeye, Adebisi – ProQuest LLC, 2015
Electronic medical record (EMR) use has improved significantly in health care organizations. However, many barriers and factors influence the success of EMR implementation and adoption. The purpose of the descriptive qualitative single-case study was to explore health care professionals' perceptions of the use of EMRs at a hospital division of a…
Descriptors: Records (Forms), Allied Health Personnel, Hospitals, Information Storage
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Lyman, Peter – Educom Review, 1999
Consideration of metaphors related to the Internet focuses on the information superhighway, virtual communities, and digital libraries. Highlights include the Digital Millenium Copyright Act of 1998; the Uniform Commercial Code; equality; privacy; communication; authorship; open software; information management; user fees; library collections; and…
Descriptors: Communication (Thought Transfer), Computer Software, Electronic Libraries, Information Management
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E. – Bowker Annual Library and Book Trade Almanac, 2003
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
Descriptors: Annual Reports, Computer Software, Electronic Libraries, Employment Projections
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers