Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computers | 4 |
Data Collection | 4 |
Privacy | 4 |
Confidential Records | 3 |
Higher Education | 3 |
Computer Security | 2 |
Computer Software | 2 |
Data | 2 |
Data Analysis | 2 |
Federal Legislation | 2 |
Information Technology | 2 |
More ▼ |
Publication Type
Journal Articles | 2 |
Opinion Papers | 2 |
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Samuels, Dorothy J. – USA Today, 1984
The federal government, credit bureaus, banks, and insurance and telephone companies all maintain files on clients. Once available, the temptation to use information on file is often irresistible. In terms of personal privacy, the most frightening development is the growth of computer-matching programs, where two agencies check each others' files.…
Descriptors: Civil Liberties, Computers, Confidential Records, Data Collection
Hample, Stephen R. – 1977
"Enrollment Information System" is used to denote a procedure by which student specific data, rather than aggregated tables, will be transmitted to the Maryland State Board of Higher Education (SBHE) on computer tapes. Tapes received by SBHE contain essentially one punched card per student, permitting staff to generate more efficiently…
Descriptors: Computers, Confidential Records, Data Analysis, Data Collection
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers