Stakeholders supporting enrollment of students from financial aid, governments to corporations require access to student and faculty information at different levels and times. Funding models are evolving. Funding access to higher education is not the only focus or priority as we shift the emphasis to trying to serve a more diverse student population. Student success, which could span institutions, time windows and regions, means we need to gain access to elements beyond the snapshot data captured on the 10th day of class at one institution.
For instance, state agencies aggregating longitudinal data to study student achievement and enrollment patterns needs access to student information triggered by events, not just a fixed window of time. Who stopped out? Exit interviews. Where are they going? What is the reason for stopping out premature? They also need access to faculty data to validate credentials, courses taught, research and other profile data that helps express the elements of instructional quality.
Today, the present mode of aggregating student data is through snapshot and distributing copies of denormalized streams. Texas for example pulls a range of custom CBM reports across a wide range of datasets to track student, course, faculty and resource allocations across year/term sessions. Other states have similar data gathering approaches. With National Activities, governments are requesting more and more data down to the student level, to verify how programs of study are attracting, retaining and graduating students in top fields.
Imagine if we could poll institutions for access to student enrollment, billing, financial aid, course completion and advising data to track the major events of student activities that could address patterns impacting their success. Imagine corporations able to access their sponsored learners information to support tracking the training and learning they sponsor in their HR Systems without re-keying.
The issue of access and security is not the obstacle. Any access method would have to have authentication and approval. The point is, how can we enable access to information managed by authoritative sources and reduce the duplication and half-life of data created by cloning?