NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Data Quality Campaign, 2022
State legislators have the opportunity to create and support legislation that positions data as a tool to help decisionmakers at all levels take action to support student success. This checklist can serve as a guide to crafting legislation that addresses education data. It applies specifically to education data legislation which includes bills…
Descriptors: State Legislation, Data Collection, Data Analysis, Educational Policy
Kamara, Kesselly Sheick – ProQuest LLC, 2019
The problem addressed by this study is the strategies analysts need in higher education institutions to improve the protection of personally identifiable and sensitive data. The qualitative exploratory design was used to examine the strategies used by nine analysts. The combined experience of the nine analysts in data analytics, cyber security,…
Descriptors: Higher Education, Information Security, Privacy, Ownership
von Zastrow, Claus; Perez, Zeke, Jr. – Education Commission of the States, 2022
Data systems are becoming powerful tools to address students' diverse and changing needs, but without comprehensive data privacy policies, the risks of unintentional or malicious disclosures of students' private information is increasing. Given the mounting challenges to protect data privacy, Education Commission of the States assembled data…
Descriptors: Data Use, Privacy, Information Management, Access to Information
Anderson, Rachel – Institute for Higher Education Policy, 2019
State longitudinal data systems can be a powerful tool to support student success and spur equity-minded improvement throughout state education systems, but state policymakers must ensure that students' information is safe and secure. In a case study looking at Louisiana's efforts to secure student data, this profile illuminates some of the…
Descriptors: Data Collection, Privacy, Student Records, Data Use
Business-Higher Education Forum, 2019
"Creating Purposeful Partnerships" offers insights into business-led regional talent ecosystems that facilitate access, alignment, and development of a prepared workforce with the skills necessary for companies' long-term success. The findings of this report serve as a playbook for CEOs and their executive teams for establishing…
Descriptors: Partnerships in Education, School Business Relationship, Higher Education, Teamwork
Hedger, Joseph – National Association of State Boards of Education, 2018
In 2018, state boards of education discussed and adopted policies to increase accountability for student data protection and to increase transparency of schoolwide data through data dashboards. This analysis highlights policy changes in state data protection requirements, test administration and security, records retention, and confidentiality…
Descriptors: Shared Resources and Services, Privacy, Data, Information Security
St. Rose, Veronica – ProQuest LLC, 2015
The purpose of this research study was to gain understanding and insight from a group of employees at Washington Adventist University (WAU) as to the benefits of having a Knowledge Management System with security access controls using the Role Based Access Control model to protect knowledge. The information from this research can help fill the gap…
Descriptors: Knowledge Management, Information Systems, Information Security, Universities
Business-Higher Education Forum, 2018
Through the collaboration of its members, the Business-Higher Education Forum (BHEF) launched the National Higher Education and Workforce Initiative (HEWI) to support business-higher education partnerships that co-design community college and university pathways to careers in fields critical to innovation and national security, as well as maximize…
Descriptors: Colleges, School Business Relationship, Partnerships in Education, Community Colleges
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Shuangbao; Kelly, William – Journal of Learning Analytics, 2017
In this paper, we present a novel system, inVideo, for video data analytics, and its use in transforming linear videos into interactive learning objects. InVideo is able to analyze video content automatically without the need for initial viewing by a human. Using a highly efficient video indexing engine we developed, the system is able to analyze…
Descriptors: Video Technology, Online Courses, Educational Technology, Information Security
Barkanic, Stephen – Business-Higher Education Forum, 2016
The United States faces a pressing national security and competitiveness challenge rooted in a shortage of a diverse, highly skilled workforce, particularly in vital cross-disciplinary fields such as data science and analytics, cybersecurity, and information technology. To address this challenge, Business-Higher Education Forum (BHEF) launched the…
Descriptors: Alignment (Education), Postsecondary Education, Labor Needs, Strategic Planning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Amigud, Alexander – International Review of Research in Open and Distance Learning, 2013
Physical separation of students and instructors creates the gap of anonymity and limited control over the remote learning environment. The ability of academic institutions to authenticate students and validate authorship of academic work at various points during a course is necessary for preserving not only perceived credibility but also public…
Descriptors: Foreign Countries, Distance Education, Higher Education, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Business-Higher Education Forum, 2014
The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to…
Descriptors: Internet, Computer Security, Corporations, College Presidents
Business-Higher Education Forum, 2013
This is the first in a series of Business-Higher Education Forum (BHEF) playbooks intended to assist companies, higher education institutions, private philanthropies, membership associations, professional societies, government agencies, and other stakeholders seeking to understand the potential value of investing in coordinated strategic,…
Descriptors: Higher Education, Labor Force Development, Partnerships in Education, Academic Persistence
Previous Page | Next Page ยป
Pages: 1  |  2