Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Data Collection | 3 |
| Data Use | 3 |
| Privacy | 3 |
| Information Security | 2 |
| Access to Information | 1 |
| Accuracy | 1 |
| Algorithms | 1 |
| Artificial Intelligence | 1 |
| Automation | 1 |
| Certification | 1 |
| Civil Rights | 1 |
| More ▼ | |
Publication Type
| Guides - General | 3 |
| Reports - Descriptive | 1 |
Education Level
Audience
| Policymakers | 1 |
Location
Laws, Policies, & Programs
| Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Data Quality Campaign, 2025
Statewide longitudinal data systems (SLDSs) often rely on personal identifiers to securely link individual-level data across early childhood, K-12, higher education, and the workforce. However, different sectors use different types of personal identifiers which can make accurately connecting records difficult. Driver's license data offers a single…
Descriptors: Data Collection, Motor Vehicles, Certification, Education Work Relationship
Samantha Fu; Charles Davis; Jesse Rothstein; Aparna Ramesh; Evan White – Grantee Submission, 2022
Linking data together can be a powerful way for governments and researchers alike to tackle vexing public policy research problems. However, for researchers, finding ways to link data directly between two departments can often be more challenging than even obtaining the data in the first place. Even when a researcher develops the necessary…
Descriptors: Data Use, Research Methodology, Researchers, Privacy
The White House, 2022
Among the great challenges posed to democracy today is the use of technology, data, and automated systems in ways that threaten the rights of the American public. Too often, these tools are used to limit our opportunities and prevent our access to critical resources or services. These problems are well documented. In America and around the world,…
Descriptors: Artificial Intelligence, Algorithms, Privacy, Information Security

Peer reviewed
