Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Author
Breitbach, William | 1 |
Bucher, Tobias | 1 |
Chretien, Wendy | 1 |
Cundiff, Jacob | 1 |
Emery, Jill | 1 |
Gericke, Anke | 1 |
Havelka, Douglas | 1 |
Kwanya, Tom | 1 |
McCallum, Taylor | 1 |
Panettieri, Joseph C. | 1 |
Rich, Andrew | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 6 |
Reports - Evaluative | 2 |
Opinion Papers | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 7 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Breitbach, William – Computers in Libraries, 2012
Competition in the virtual reference market got really hot this past summer. Recent developments in virtual reference offerings suggest the market is much more dynamic than most people would have imagined a short time ago. With Google's acquisition of Meebo and its subsequent decision to shut down the chat widget service, many libraries scrambled…
Descriptors: Library Services, Reference Services, Library Development, Online Systems
Kwanya, Tom; Stilwell, Christine; Underwood, Peter G. – Journal of Librarianship and Information Science, 2013
Using the "point oh" naming system for developments in librarianship is attracting debate about its appropriateness, basis and syntax and the meaning and potential of Library 2.0. Now a new term, Library 3.0, has emerged. Is there is any significant difference between the two models? Using documentary analysis to explore the terms, the…
Descriptors: Information Networks, Library Automation, Library Development, Library Services
Cundiff, Jacob; McCallum, Taylor; Rich, Andrew; Truax, Michael; Ward, Tamara; Havelka, Douglas – Journal of Information Systems Education, 2015
The launch of HealthCare.gov, the website of the Affordable Care Act (AKA Obamacare), was a major public relations disaster for the Obama administration. This case examines some of the factors that contributed to the failure of the launch and then details how Optum, an information technology service provider, considered the opportunity provided by…
Descriptors: Case Studies, Information Systems, Database Management Systems, Online Vendors
Trust, Torrey – Journal of Digital Learning in Teacher Education, 2012
In the information age, students must learn to navigate and evaluate an expanding network of information. Highly effective teachers model this process of information analysis and knowledge acquisition by continually learning through collaboration, professional development, and studying pedagogical techniques and best practices. Many teachers have…
Descriptors: Web Sites, Web 2.0 Technologies, Computer Software Evaluation, Teacher Collaboration
Emery, Jill – Journal of Electronic Resources Librarianship, 2009
Twitter provides rapid information in a short form, and it is extremely easy to follow the updates of others because of myriad software applications with which it works on both mobile devices and traditional computing hardware. Currently, most academic librarians are using Twitter primarily as a tool at library conferences and seminars to capture…
Descriptors: Internet, Librarians, Use Studies, Information Networks
Shi, Xue-yun – Online Submission, 2007
"EGao" is a network producing form and is popular in campus. In order to amuse the masses, it changed and reformed films, TV, picture menus and songs by imitating, overdrawing and self-betrayal means. The impact of "EGao" is greater and greater in the young, especially in the university, it has become a fashion. The paper analyzed its concepts,…
Descriptors: Social Psychology, Hypermedia, Computer Software Evaluation, Information Networks
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Winter, Robert; Gericke, Anke; Bucher, Tobias – Educational Technology & Society, 2008
Business intelligence and information logistics have become an important part of teaching curricula in recent years due to the increased demand for adequately trained graduates. Since these fields are characterized by a high amount of software and methodology innovations, teaching materials and teaching aids require constant updating. Teradata has…
Descriptors: Feedback (Response), Intelligence, Action Research, Management Information Systems
Chretien, Wendy – Campus Technology, 2008
Emergency notification has become a critical component of every higher education institution's overall emergency plan, as incidents across the country have galvanized campus safety officials to find more ways to notify their campus populations. Emergency notification systems can help get and keep students, faculty members, and staff out of harm's…
Descriptors: School Security, School Safety, Emergency Programs, Crisis Management