Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Access to Information | 4 |
Decision Making | 4 |
Systems Analysis | 4 |
Information Management | 3 |
Public Agencies | 3 |
Confidentiality | 2 |
Data Collection | 2 |
Information Systems | 2 |
Local Area Networks | 2 |
Microcomputers | 2 |
Stakeholders | 2 |
More ▼ |
Author
Helsing, Cheryl | 2 |
Publication Type
Guides - General | 2 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Education Level
Early Childhood Education | 1 |
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
10 Fundamentals of Coordinated State Early Care and Education Data Systems: Inaugural State Analysis
Early Childhood Data Collaborative (NJ1), 2011
State policymakers are increasingly focused on closing the achievement gap and preparing all students to succeed in school and life. However, college and career readiness begins long before students enter high school or even a classroom. Differences in children's abilities appear as early as the first year of life, and research has shown that…
Descriptors: Fundamental Concepts, State Policy, State Standards, Early Childhood Education
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Helsing, Cheryl; And Others – 1989
The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…
Descriptors: Access to Information, Confidentiality, Decision Making, Information Management
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers