NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Isaac, James; Velez, Erin; Roberson, Amanda Janice – Institute for Higher Education Policy, 2023
Students, families, colleges, and lawmakers need clearer information on postsecondary outcomes to make informed decisions. By leveraging data available at institutions and federal agencies, a nationwide student-level data network (SLDN) would close information gaps that persist in our higher education landscape to answer critical questions about…
Descriptors: College Students, Data, Information Networks, Program Design
Goodman, Christie L., Ed. – Intercultural Development Research Association, 2017
Each edition of the IDRA Newsletter strives to provide many different perspectives on the issues in education topics discussed and to define its significance in the state and national dialogue. This issue focuses on Using Data for Action and includes: (1) Community and School Use of Data for College Readiness and Postsecondary Success (Karmen…
Descriptors: Postsecondary Education, College Readiness, Higher Education, Career Readiness
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy