Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 9 |
Descriptor
Access to Information | 9 |
Information Security | 9 |
Information Systems | 9 |
Privacy | 4 |
College Administration | 3 |
Information Management | 3 |
Information Technology | 3 |
Case Studies | 2 |
College Students | 2 |
Computer Security | 2 |
Confidentiality | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Community College Journal | 1 |
Data Quality Campaign | 1 |
IGI Global | 1 |
Information Systems Education… | 1 |
International Journal of… | 1 |
Journal of Information… | 1 |
National Forum on Education… | 1 |
Author
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Dissertations/Theses -… | 2 |
Reports - Research | 2 |
Books | 1 |
Collected Works - General | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Early Childhood Education | 1 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Location
Arkansas | 1 |
California | 1 |
Georgia | 1 |
Idaho | 1 |
Kentucky | 1 |
Louisiana | 1 |
Minnesota | 1 |
Nebraska | 1 |
New Jersey | 1 |
Rhode Island | 1 |
Tennessee (Nashville) | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
National Forum on Education Statistics, 2020
The "Forum Guide to Data Governance" highlights how data governance programs benefit education agencies and provide timely and useful best practices, examples, and resources for agencies implementing or updating their data governance programs. This resource is intended to address the needs of federal, state, and local agencies related…
Descriptors: Data, Governance, Information Security, Privacy
Ardalan, Alireza; Ardalan, Roya K.; Rao, Shailaja; Alexander, Kay B. – International Journal of Information and Learning Technology, 2019
Purpose: There has been a lack of an information systems architecture which explicitly illustrates processes that make and maintain the anonymity of student responses in an online system for student opinion survey of faculty teaching. The purpose of this paper is to present an information systems architecture which explicitly shows the process of…
Descriptors: Information Systems, Information Management, Privacy, Student Surveys
Data Quality Campaign, 2021
The 2020 election brought about legislative change across the country. New and veteran policymakers need information about the schools in their state. What programs are the most cost effective and work best for students? How can states attract and retain great teachers? What information do parents need to ensure that their kids are on track to…
Descriptors: Educational Policy, Policy Formation, Data Collection, Data Analysis
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Makewa, Lazarus Ndiku, Ed.; Ngussa, Baraka Manjale, Ed. – IGI Global, 2020
Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how…
Descriptors: Information Technology, Higher Education, Organizational Culture, College Faculty
Ayyagari, Ramakrishna; Tyks, Jonathan – Journal of Information Technology Education: Innovations in Practice, 2012
Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…
Descriptors: Information Technology, Information Systems, Core Curriculum, Information Security
Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A. – Information Systems Education Journal, 2010
This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…
Descriptors: Information Systems, Information Security, Accreditation (Institutions), Educational Innovation
Lee, Ally – ProQuest LLC, 2011
Over the past decade, there has been a change in the citizen-government relationship. Citizens have moved from a traditional face-to-face communication with their government, to an electronic interaction through the use of e-government systems. Emerging technology has enabled citizens to communicate with their government remotely. However, trust…
Descriptors: Factor Analysis, Information Systems, Predictor Variables, Focus Groups