NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20251
Since 2022 (last 5 years)1
Since 2017 (last 10 years)2
Since 2007 (last 20 years)19
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 19 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Grama, Joanna – EDUCAUSE, 2014
This "Just in Time" research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this…
Descriptors: Higher Education, Information Policy, Information Security, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Heinen, Richard; Kerres, Michael; Scharnberg, Gianna; Blees, Ingo; Rittberger, Marc – Journal of Interactive Media in Education, 2016
The paper describes the concept of a federated ecosystem for Open Educational Resources (OER) in the German education system. Here, a variety of OER repositories (ROER) (Muuß-Merholz & Schaumburg, 2014) and reference platforms have been established in the recent past. In order to develop this ecosystem, not only are metadata standards…
Descriptors: Reference Services, Educational Resources, Open Source Technology, Metadata
Peer reviewed Peer reviewed
Direct linkDirect link
Graham, Rumi – College & Research Libraries, 2016
Recent changes in Canadian copyright law have prompted Canada's educational institutions to reexamine their need for a blanket copying license. Users' rights under the amended Copyright Act now include fair dealing for purposes of education, and the Supreme Court has established that copying short excerpts for classroom use can qualify as fair…
Descriptors: Foreign Countries, Copyrights, Court Litigation, Information Policy
US Government Accountability Office, 2016
Enacted in 2014, the Workforce Innovation and Opportunity Act (WIOA) brought numerous changes to existing federal employment and training programs, including requiring the Department of Labor (DOL) and the Department of Education (Education) to implement a common performance accountability system across the six WIOA-designated core programs. WIOA…
Descriptors: Federal Legislation, Legislators, Accountability, Job Training
Privacy Technical Assistance Center, 2017
Educational authorities and policymakers are increasingly focused on protecting student privacy while using data to inform program and policy decisions. Data from more than one government agency is often analyzed to more holistically inform these decisions. This has led to the development of integrated data systems (IDSs) that allow linkage of…
Descriptors: Privacy, Information Systems, Database Management Systems, Program Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Fritch, Melia; Pitts, Joelle E. – Journal of Electronic Resources Librarianship, 2016
The authors discuss the long-term accumulation of unstandardized and inaccessible content within the Libguides system and the decision-making process to create and implement a set of standards using the migration to the LibGuides2 platform as a vehicle for change. Included in the discussion are strategies for the creation of standards and…
Descriptors: Standard Setting, Information Policy, Compliance (Legal), Change Strategies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
Otero, Angel R. – ProQuest LLC, 2014
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
Descriptors: Information Security, Information Policy, Quality Control, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Reisner, Barbara A.; Vaughan, K. T. L.; Shorish, Yasmeen L. – Journal of Chemical Education, 2014
In the age of "big data" science, data management is becoming a key information literacy skill for chemistry professionals. To introduce this skill in the undergraduate chemistry major, an activity has been developed to familiarize undergraduates with data management. In this activity, students rename and organize cards that represent…
Descriptors: Undergraduate Students, Chemistry, Best Practices, Scientific and Technical Information
Akpabio, Akpabio Enebong Ema – ProQuest LLC, 2013
Despite huge growth in hospital technology systems, there remains a dearth of literature examining health care administrator's perceptions of the efficacy of interoperable EHR systems. A qualitative research methodology was used in this multiple-case study to investigate the application of diffusion of innovations theory and the technology…
Descriptors: Medical Services, Case Records, Database Management Systems, Adoption (Ideas)
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Lewis, Stuart; Hayes, Leonie; Newton-Wade, Vanessa; Corfield, Antony; Davis, Richard; Donohue, Tim; Wilson, Scott – Program: Electronic Library and Information Systems, 2009
Purpose: The purpose of this paper is to describe the repository deposit protocol, Simple Web-service Offering Repository Deposit (SWORD), its development iteration, and some of its potential use cases. In addition, seven case studies of institutional use of SWORD are provided. Design/methodology/approach: The paper describes the recent…
Descriptors: Case Studies, Standards, Web Sites, Information Policy
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Previous Page | Next Page »
Pages: 1  |  2