Publication Date
| In 2026 | 0 |
| Since 2025 | 70 |
| Since 2022 (last 5 years) | 285 |
| Since 2017 (last 10 years) | 780 |
| Since 2007 (last 20 years) | 2173 |
Descriptor
Source
Author
| McClure, Charles R. | 16 |
| Bryant, Rebecca | 9 |
| Penrod, James I. | 9 |
| Telem, Moshe | 9 |
| Glover, Robert H. | 8 |
| Lavoie, Brian | 8 |
| Thomas, Charles R. | 8 |
| Bozeman, William C. | 7 |
| Groff, Warren H. | 7 |
| Howard, Richard D. | 7 |
| Johnson, L. | 7 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 513 |
| Administrators | 358 |
| Policymakers | 114 |
| Researchers | 104 |
| Teachers | 98 |
| Media Staff | 74 |
| Students | 18 |
| Support Staff | 8 |
| Community | 6 |
| Parents | 5 |
| Counselors | 4 |
| More ▼ | |
Location
| Australia | 118 |
| California | 99 |
| United States | 88 |
| Canada | 84 |
| Texas | 79 |
| United Kingdom | 79 |
| Florida | 55 |
| Pennsylvania | 46 |
| Illinois | 44 |
| New York | 44 |
| Ohio | 44 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
Salomon-Fernandez, Yves – New England Journal of Higher Education, 2014
Within the information technology sector, cybersecurity is considered its own supersector. As information becomes increasingly digitized and a growing array of transactions can be completed in the cloud, people, governments and enterprises become increasingly more vulnerable. The Identity Theft Resources Center (ITRC) reports nearly 5,000 breaches…
Descriptors: Information Technology, Information Security, Community Colleges, Universities
Lang, Leah; Pirani, Judith A. – EDUCAUSE, 2014
This Spotlight focuses on data from the 2013 Core Data Service (CDS) to better understand how higher education institutions approach student information systems (SISs). Information provided for this spotlight was derived from Module 8 of the CDS survey, which asked several questions regarding information systems and applications. Responses from…
Descriptors: Higher Education, Information Systems, Institutional Characteristics, Classification
Data Quality Campaign, 2014
District and state data systems are constructed to ensure that individuals can access only the data that are appropriate for their role. Still, questions from the public about how these data systems work and how student privacy is protected have been increasing. A recurring concern is the feared existence of a "permanent record"--a…
Descriptors: Data Collection, Student Records, Data Processing, Access to Information
Delaquis, Richard Serge – ProQuest LLC, 2012
The Clinger Cohen Act of 1996 requires that all major Federal Government Information Technology (IT) systems prepare an Enterprise Architecture prior to IT acquisitions. Enterprise Architecture, like house blueprints, represents the system build, capabilities, processes, and data across the enterprise of IT systems. Enterprise Architecture is used…
Descriptors: Human Resources, Information Technology, Information Management, Federal Government
Wang, Shiyuan – ProQuest LLC, 2012
Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…
Descriptors: Internet, Privacy, Information Services, Technology
Chipidza, Wallace; Green, Gina; Riemenschneider, Cindy – Journal of Information Systems Education, 2019
A McKinsey & Company report states that a gap in information technology skills remains in the U.S. and globally. Combined with continued projections for high growth in MIS positions such as Systems Analysts and Software Applications Developers, increasing student enrollment in MIS continues to be a focus for MIS academicians and professionals.…
Descriptors: Behavior Theories, Management Information Systems, Majors (Students), College Students
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Lyon, Liz – New Review of Academic Librarianship, 2016
This article presents a case study where students aspiring to professional library roles who need to understand diverse disciplinary research data practices are placed in a laboratory with domain researchers during an immersive module within graduate MLIS programs at the School of Information Sciences (iSchool), University of Pittsburgh. A…
Descriptors: Case Studies, Information Science Education, Blended Learning, Learning Experience
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
National Forum on Education Statistics, 2016
The National Forum on Education Statistics (Forum) organized the Education Data Privacy Working Group to explore how state and local education agencies (SEAs and LEAs) can support best practices at the school level to protect the confidentiality of student data in day-to-day instructional and administrative tasks. Many of the best practices…
Descriptors: Privacy, Confidentiality, Case Studies, Risk Management
Schaffhauser, Dian – Campus Technology, 2013
For any institution looking to shift enterprise resource planning (ERP) systems to the cloud, big savings can be achieved--but only if the school has properly prepped "before" negotiations begin. These three steps can help: (1) Mop up the mess first; (2) Understand the true costs for services; and (3) Calculate the cost of transition.
Descriptors: Cost Effectiveness, Information Management, Information Policy, Technology Planning
Laney, Christine Marie – ProQuest LLC, 2013
Ecosystem health is deteriorating in many parts of the world due to direct and indirect anthropogenic pressures. Generating accurate, useful, and impactful models of past, current, and future states of ecosystem structure and function is a complex endeavor that often requires vast amounts of data from multiple sources and knowledge from…
Descriptors: Ecology, Information Management, Data Collection, Automation
Giouvanakis, Thanasis; Samaras, Haido; Kehris, Evangelos; Mpakavos, Asterios – International Association for Development of the Information Society, 2013
This paper presents a framework for the evaluation of concept maps. We focus on supporting the student in dealing with ill-structured and complex problems. We argue that these problems require the application of "the modularity approach." In view of this, the paper describes ways of providing student support for the implementation of…
Descriptors: Electronic Learning, Educational Technology, Technology Uses in Education, Concept Mapping
Esa, Ahmad; Padil, Suhaili; Selamat, Asri; Idris, Mohammad Talha Mohamed – International Education Studies, 2015
Soft skills are some of the skills needed to ensure that graduates fulfill the needs of the job market. Until 2010, almost 30% of unemployed graduates in Malaysia are technical graduates and one third comes are graduates from polytechnic. Most engineering graduates are proficient in technical skills but lack in soft skills. The lack of relevant…
Descriptors: Foreign Countries, Engineering, Engineering Education, College Students
Smith, Peter – New England Journal of Higher Education, 2015
With its October 2014 day-long conference on competency-based education and Higher Education Innovation Challenge (HEIC), the New England Board of Higher Education (NEBHE) is creating a space in which New England states and institutions can wrestle with the critical issues driven by abundant information. The HEIC lists multiple areas where the…
Descriptors: Higher Education, Access to Information, Student Records, Databases

Direct link
Peer reviewed
