Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 12 |
Descriptor
| Database Management Systems | 14 |
| Information Management | 14 |
| Information Policy | 14 |
| Information Systems | 6 |
| Access to Information | 4 |
| Best Practices | 4 |
| Case Studies | 4 |
| Compliance (Legal) | 4 |
| Information Technology | 4 |
| Computer System Design | 3 |
| Human Factors Engineering | 3 |
| More ▼ | |
Source
Author
Publication Type
| Journal Articles | 6 |
| Dissertations/Theses -… | 4 |
| Reports - Descriptive | 4 |
| Reports - Research | 4 |
| Reports - Evaluative | 2 |
| Guides - Non-Classroom | 1 |
Education Level
| Higher Education | 5 |
| Postsecondary Education | 4 |
| Adult Education | 3 |
| Elementary Secondary Education | 1 |
Audience
| Media Staff | 1 |
Location
| Australia | 1 |
| California | 1 |
| Florida | 1 |
| Kansas | 1 |
| Ohio | 1 |
Laws, Policies, & Programs
| Family Educational Rights and… | 1 |
| Individuals with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Grama, Joanna – EDUCAUSE, 2014
This "Just in Time" research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this…
Descriptors: Higher Education, Information Policy, Information Security, Privacy
Privacy Technical Assistance Center, 2017
Educational authorities and policymakers are increasingly focused on protecting student privacy while using data to inform program and policy decisions. Data from more than one government agency is often analyzed to more holistically inform these decisions. This has led to the development of integrated data systems (IDSs) that allow linkage of…
Descriptors: Privacy, Information Systems, Database Management Systems, Program Evaluation
Adding Bite to the Bark: Using LibGuides2 Migration as Impetus to Introduce Strong Content Standards
Fritch, Melia; Pitts, Joelle E. – Journal of Electronic Resources Librarianship, 2016
The authors discuss the long-term accumulation of unstandardized and inaccessible content within the Libguides system and the decision-making process to create and implement a set of standards using the migration to the LibGuides2 platform as a vehicle for change. Included in the discussion are strategies for the creation of standards and…
Descriptors: Standard Setting, Information Policy, Compliance (Legal), Change Strategies
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
Otero, Angel R. – ProQuest LLC, 2014
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
Descriptors: Information Security, Information Policy, Quality Control, Quality Assurance
Reisner, Barbara A.; Vaughan, K. T. L.; Shorish, Yasmeen L. – Journal of Chemical Education, 2014
In the age of "big data" science, data management is becoming a key information literacy skill for chemistry professionals. To introduce this skill in the undergraduate chemistry major, an activity has been developed to familiarize undergraduates with data management. In this activity, students rename and organize cards that represent…
Descriptors: Undergraduate Students, Chemistry, Best Practices, Scientific and Technical Information
Akpabio, Akpabio Enebong Ema – ProQuest LLC, 2013
Despite huge growth in hospital technology systems, there remains a dearth of literature examining health care administrator's perceptions of the efficacy of interoperable EHR systems. A qualitative research methodology was used in this multiple-case study to investigate the application of diffusion of innovations theory and the technology…
Descriptors: Medical Services, Case Records, Database Management Systems, Adoption (Ideas)
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government
Ohio State Legislative Office of Education Oversight, Columbus. – 1998
Due to legislative mandate, the Ohio Department of Education (ODE) was required to develop a system (the Education Management Information System) that would increase the amount of information available to state-level policy makers and the public. Some recommendations for improving the function of EMIS are offered in this report. The text provides…
Descriptors: Database Management Systems, Educational Improvement, Educational Legislation, Elementary Secondary Education
Center for the Future of Teaching and Learning, 2007
Reliable and current data is the foundation upon which good public policymaking is built. While California collects a good deal of data on its teaching workforce, policymakers have lacked a state-level data and analysis system to provide answers to even some of the most basic questions: How many credential holders actually take jobs? In what types…
Descriptors: State Agencies, Inferences, Teacher Supply and Demand, Management Information Systems
Middleton, Michael – Australian Academic & Research Libraries, 2006
An investigation of the development of Australian scientific and technological information (STI) services has been undertaken. It comprises a consideration of the characteristics and development of the services, which is the focus of this part of the paper, along with a broader examination of discipline formation in information management covered…
Descriptors: Information Services, Foreign Countries, Scientific and Technical Information, Information Management

Peer reviewed
Direct link
