Publication Date
In 2024 | 0 |
Since 2023 | 1 |
Since 2020 (last 5 years) | 4 |
Since 2015 (last 10 years) | 11 |
Since 2005 (last 20 years) | 18 |
Descriptor
Source
Author
Anderson, Rachel | 1 |
Anukam, Ray I. | 1 |
Ballard, Chet | 1 |
Binh Tran | 1 |
Boltri, John M. | 1 |
Chapman, Sidney L. | 1 |
Clark, Denice | 1 |
Dodrill, Carrie | 1 |
Fenwick, Leslie T. | 1 |
Gale, Doug | 1 |
Gault, Barbara | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 7 |
Elementary Secondary Education | 4 |
Postsecondary Education | 4 |
Early Childhood Education | 2 |
Adult Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Georgia | 27 |
Washington | 6 |
Florida | 5 |
Maryland | 5 |
Ohio | 5 |
Indiana | 4 |
Minnesota | 4 |
Pennsylvania | 4 |
Virginia | 4 |
Arkansas | 3 |
California | 3 |
More ▼ |
Laws, Policies, & Programs
Child Care and Development… | 1 |
Elementary and Secondary… | 1 |
Elementary and Secondary… | 1 |
Family Educational Rights and… | 1 |
No Child Left Behind Act 2001 | 1 |
Race to the Top | 1 |
Assessments and Surveys
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Johnson, David P. – ProQuest LLC, 2017
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…
Descriptors: Information Security, Behavior, Intention, Behavior Theories
National Commission on Teaching and America's Future, 2010
Working with Richard Ingersoll, professor of Education and Sociology at the University of Pennsylvania, the National Commission on Teaching and America's Future (NCTAF) examined and analyzed data from the "Schools and Staffing Survey" (SASS), the largest and most comprehensive source of data on teachers, gathered from a nationally…
Descriptors: Teacher Effectiveness, Teacher Retirement, Baby Boomers, Retirement Benefits
Violence Prevention in Georgia's Rural Public School Systems: Perceptions of School Superintendents.
Peer reviewed
Ballard, Chet – Southern Rural Sociology, 1998
Survey responses by superintendents in 81 of Georgia's 114 rural school districts covered violence prevention policies; use of searches, videocamera surveillance, metal detectors, security alarm systems, dress codes, and law enforcement officers on campus; incidence of removal of weapons and various forms of violence; student discipline programs;…
Descriptors: Administrator Attitudes, Discipline, Elementary Secondary Education, Prevention
Anukam, Ray I.; Harnish, Dorothy – 1994
These two documents summarize the findings of the 1994 and 1995 rounds of the Technical Institute Information Technology Survey, which is conducted annually to gather information about a broad range of technology uses at Georgia's technical institutes. Both reports included the responses from all of Georgia's 33 technical institutes regarding…
Descriptors: Communications Satellites, Computer Networks, Computer Uses in Education, Distance Education
Bridging Systems for Family Economic Mobility: Postsecondary and Early Education Partnerships. #C482
Gault, Barbara; Reichlin Cruse, Lindsey; Schumacher, Rachel – Institute for Women's Policy Research, 2019
Promoting family economic security and mobility requires collaboration across key systems that serve families. This report describes opportunities for the early childhood and higher education systems to support each other's key goals for system advancements to increase economic mobility among America's families. It provides examples of early…
Descriptors: Partnerships in Education, Early Childhood Education, Higher Education, College Students
Anderson, Rachel – Institute for Higher Education Policy, 2019
State longitudinal data systems can be a powerful tool to support student success and spur equity-minded improvement throughout state education systems, but state policymakers must ensure that students' information is safe and secure. In a case study looking at Louisiana's efforts to secure student data, this profile illuminates some of the…
Descriptors: Data Collection, Privacy, Student Records, Data Use
Robertson, Douglas L. – Innovative Higher Education, 2022
This article introduces the Faculty Appointment Security Typology which combines the variables of Permanent Faculty (tenured, tenure-earning), Contingent Faculty (non-tenure), Full-Time, and Part-Time. The research question is, are female and minoritized faculty overrepresented in less secure faculty appointment types, and has the phenomenon…
Descriptors: College Faculty, Tenure, Nontenured Faculty, Part Time Faculty
Jordan, Elizabeth; Schultz, Thomas; King, Carlise – Early Childhood Data Collaborative, 2015
Head Start programs are a critical component of early care and education. At present, there is no requirement for local Head Start programs to link or share their data with other state data systems. However, several states are making advances toward linking and/or sharing data across their state's K-12 data system or other services' data systems.…
Descriptors: Early Intervention, Early Childhood Education, At Risk Students, Data
National Forum on Education Statistics, 2020
The "Forum Guide to Data Governance" highlights how data governance programs benefit education agencies and provide timely and useful best practices, examples, and resources for agencies implementing or updating their data governance programs. This resource is intended to address the needs of federal, state, and local agencies related…
Descriptors: Data, Governance, Information Security, Privacy
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Rickman, Dana – State Education Standard, 2016
By combining an overall vision for the use of data, a commitment to protecting student privacy and data integrity, and supportive legislation, Georgia emerged as a leader in the effective use of student data. But it easily could have gone another way. None of the three elements could be taken for granted when Georgia set out to develop its state…
Descriptors: Student Records, Information Security, Privacy, Educational Legislation
von Zastrow, Claus; Perez, Zeke, Jr. – Education Commission of the States, 2022
Data systems are becoming powerful tools to address students' diverse and changing needs, but without comprehensive data privacy policies, the risks of unintentional or malicious disclosures of students' private information is increasing. Given the mounting challenges to protect data privacy, Education Commission of the States assembled data…
Descriptors: Data Use, Privacy, Information Management, Access to Information
Seale, J. Paul; Velasquez, Mary M.; Johnson, J. Aaron; Shellenberger, Sylvia; von Sternberg, Kirk; Dodrill, Carrie; Boltri, John M.; Takei, Roy; Clark, Denice; Grace, Daniel – Substance Abuse, 2012
Alcohol screening and brief intervention (SBI) is recommended for all primary care patients but is underutilized. This project trained 111 residents and faculty in 8 family medicine residencies to conduct SBI and implement SBI protocols in residency clinics, then assessed changes in self-reported importance and confidence in performing SBI and…
Descriptors: Intervention, Family Practice (Medicine), Patients, Organizational Change
Samuels, Christina A. – Education Week, 2011
The cheating scandal that has rocked the 48,000-student Atlanta school system was an egregious, but not entirely unexpected, byproduct of accountability pressures, many testing experts say. The reason: As long as test scores are used in any field to make decisions on rewards or punishments, including for schools or educators, a small percentage of…
Descriptors: Cheating, Testing, High Stakes Tests, Accountability
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Previous Page | Next Page ยป
Pages: 1 | 2