Chapter
1 Student Veterans in Higher Education: A Conversation Six Decades in the Making
The Servicemen’s Readjustment Act of 1944
The Servicemen’s Readjustment Act of 1952
The Veterans’ Readjustment Benefits Act of 1966
Veterans Educational Assistance Program of 1977 and the Montgomery G.I. Bill of 1984
The Post-9/11 Veterans Educational Assistance Act of 2008
Student Veterans: Then and Now
2 Conceptual Models of Student Veteran College Experiences
Shortcomings of Linear (Prescriptive) Models
Hammond’s Combat Veteran Conceptual Identity Model (CVCIM)
The Inferred Perception of Self
The Connections to Other Veterans
Diamond’s Adaptive Military Transition Theory (AMTT)
AMTT Transition Variations (Types)
Vacchi’s Model of Student Veteran Support
Four Key Areas to Support Student Veteran Success
3 Taxonomy of Student Veterans: A Suggested Protocol for Institutional Research Professionals
4 Differences Between Military-Connected Undergraduates: Implications for Institutional Research
Demographic Characteristics of Military-Connected Undergraduates
Enrollment Characteristics of Military-Connected Undergraduates
Employment of Military-Connected Undergraduates
Financial Aid Received by Military-Connected Undergraduates
Risk Factors Among Military-Connected Undergraduates
Implications for Institutional Researchers
5 For-Profit Institutions and Student Veteran Data
For-Profit, Not-for-Profit, and Public Institutions
Why Veterans’ Benefits Cost More at Not-for-Profit and For-Profit Institutions
G.I. Bill Feedback System
The Role of Institutional Researchers
6 Exploring Veteran Success Through State-Level Administrative Data Sets
Statewide Longitudinal Data Collection: LDS and SLDS
The Value of Statewide Data Collection
Barriers to Data Collection SLDS: Policy and Resource Allocation
Advocating for Student Veteran Success: A Data Collection Strategy
Identifying Student Veterans
Describing Financial Need
Measuring Success and Identifying Sticking Points
Meaningful Analyses for Statewide Student Veteran Data
Cohort Life-Cycle Analysis
Credential Production Reporting
Outcomes Beyond Credentials Analysis
7 Conclusion and Final Thoughts