Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 12 |
Descriptor
Source
Author
Arora, Jessie | 1 |
Beck, Katie | 1 |
Bienkowski, Marie | 1 |
Borrelli-Murray, Dana | 1 |
Capo, Berta | 1 |
Castilla, Stephanie | 1 |
Chase, Zac | 1 |
Chinsook, Kittipong | 1 |
Corn, Michael | 1 |
Czuprynski, Christine N. | 1 |
Driscoll, Tom | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 6 |
Guides - Non-Classroom | 2 |
Reports - Evaluative | 2 |
Guides - General | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Postsecondary Education | 7 |
Higher Education | 6 |
Elementary Secondary Education | 5 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 3 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Policymakers | 2 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Assessments and Surveys
What Works Clearinghouse Rating
Meadows, Lynne P.; Griffin, Connie; Luna, Francis; Maughan, Erin; Peiffer, Cheryl; Wysocki, Regina – National Association of School Nurses, 2019
It is the position of the National Association of School Nurses (NASN) that all registered professional school nurses (hereinafter referred to as school nurses) should have access to a software platform for student electronic health records (EHRs) that includes nursing language/medical terminology and complies with standards of confidentiality,…
Descriptors: School Nurses, Computer Software, Student Records, Information Management
Chinsook, Kittipong; Khajonmote, Withamon; Klintawon, Sununta; Sakulthai, Chaiyan; Leamsakul, Wicha; Jantakoon, Thada – Higher Education Studies, 2022
Big data is an important part of innovation that has recently attracted a lot of interest from academics and practitioners alike. Given the importance of the education industry, there is a growing trend to investigate the role of big data in this field. Much research has been undertaken to date in order to better understand the use of big data in…
Descriptors: Student Behavior, Learning Analytics, Computer Software, Rating Scales
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
O'Brien, Jason; Roller, Sarah; Lampley, Sandra – Journal of Cases in Educational Leadership, 2017
This case focuses on the potential problems associated with sharing personally identifiable information (PII) when students are required to use third-party software. Specifically, third-grade students were required to complete "LearningPad" activities as a component of their homework grade in math, spelling, and language arts. As…
Descriptors: Shared Resources and Services, Privacy, Computer Software, Grade 3
Privacy Technical Assistance Center, 2014
Today's classrooms increasingly employ on-demand delivery of personalized content, virtual forums for interacting with other students and teachers, and a wealth of other interactive technologies that help foster and enhance the learning process. Online forums help teachers share lesson plans; social media help students collaborate across…
Descriptors: Privacy, Information Security, Online Systems, Internet
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Bienkowski, Marie; Gerard, Sarah Nixon; Rubin, Shawn; Sanford, Cathy; Borrelli-Murray, Dana; Driscoll, Tom; Arora, Jessie; Hruska, Mike; Beck, Katie; Murray, Thomas; Hoekstra, Jason; Gannes, Stuart; Metz, Edward; Midgley, Steve; Castilla, Stephanie; Tomassini, Jason; Madda, Mary Jo; Chase, Zac; Martin, Erik; Noel, Marcus; Styles, Kathleen – Office of Educational Technology, US Department of Education, 2015
Opportunities abound for software designers and developers to create impactful tools for teachers, school leaders, students, and their families. This guide for developers, startups, and entrepreneurs addresses key questions about the education ecosystem and highlights critical needs and opportunities to develop digital tools and apps for learning.…
Descriptors: Computer Software, Design, Technology Uses in Education, Educational Technology
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers