Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 25 |
Descriptor
Source
Author
Hawkins, Brian L. | 3 |
Rudy, Julia A. | 3 |
Yang, Catherine | 2 |
Yang, Samuel C. | 2 |
Agee, Anne Scrivener | 1 |
Anderson, Sharolyn | 1 |
Bakardjieva, Teodora | 1 |
Bedi, Param | 1 |
Bellos, Nephellie | 1 |
Bhagyavati | 1 |
Brookes, Kimberly H. | 1 |
More ▼ |
Publication Type
Journal Articles | 20 |
Reports - Descriptive | 18 |
Reports - Research | 5 |
Dissertations/Theses -… | 3 |
Numerical/Quantitative Data | 3 |
Reports - Evaluative | 3 |
Tests/Questionnaires | 3 |
Speeches/Meeting Papers | 2 |
Education Level
Audience
Practitioners | 1 |
Researchers | 1 |
Location
United States | 2 |
Arkansas | 1 |
Australia | 1 |
Bulgaria | 1 |
China | 1 |
Europe | 1 |
Greece (Athens) | 1 |
Kansas | 1 |
Minnesota | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hari Prasad Challa – ProQuest LLC, 2024
The increasing complexity of modern power systems, coupled with the integration of diverse rapidly evolving technologies involving physical systems requiring cybersecurity, has presented significant challenges for engineers in the field and researchers in laboratory facilities. This research and dissertation presents the development of a…
Descriptors: Computer Security, Information Systems, Technology Integration, Information Technology
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Yang, Samuel C. – Journal of Education for Business, 2018
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in…
Descriptors: Undergraduate Students, Business Schools, Information Technology, Information Systems
Nedyalkova, Anna; Bakardjieva, Teodora; Nedyalkov, Krasimir – International Association for Development of the Information Society, 2016
This paper suggests digital approaches in university management. Digital transformation requires leadership that can maintain and balance competing interests from faculty, administrators, students and others. The team of Varna Free University designed a flexible proper solution VFU SMART STUDENT aiming at lower operating costs and better…
Descriptors: Information Security, Information Systems, Computer Networks, Guidelines
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
VanderClock, William – Information Systems Education Journal, 2015
Most freshmen taking required, introductory information systems courses do not understand why they are required to take such courses and can't imagine that they will learn anything they don't already know. This paper presents an exercise that will excite and enthuse students about their computers and Information Systems in general. Every freshman…
Descriptors: College Freshmen, Computer Literacy, Information Systems, Technological Literacy
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Meador, Ryan E. – ProQuest LLC, 2012
This study examined students who successfully applied for reinstatement after being academically dismissed for the first time in order to discover indicators of future success. This study examined 666 students' appeals filed at the DeVry University Kansas City campus between 2004 and 2009. Binary logistic regression was used to discover if a…
Descriptors: Remedial Instruction, Academic Achievement, Academic Probation, Academic Failure
Tan, Grace; Venables, Anne – Journal of Information Technology Education, 2010
Since 2001, there has been a dramatic decline in Information Technology and Computer Science student enrolments worldwide. As a consequence, many institutions have evaluated their offerings and revamped their programs to include units designed to capture students' interests and increase subsequent enrolment. Likewise, at Victoria University the…
Descriptors: Curriculum Development, Information Technology, Curriculum Design, Computer Science Education
Ingerman, Bret L.; Yang, Catherine – EDUCAUSE Review, 2010
The eleventh annual EDUCAUSE Current Issues Survey shows some very familiar themes among the top-ten IT issues of strategic importance to technology leaders in higher education. Indeed, all ten of the issues from the 2009 survey are back, albeit in a slightly different order. In addition, Strategic Planning returns as an issue of renewed…
Descriptors: Higher Education, Information Technology, Needs Assessment, Context Effect
Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie – EDUCAUSE Quarterly, 2008
Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…
Descriptors: Small Colleges, Educational Technology, Information Technology, School Policy
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Previous Page | Next Page ยป
Pages: 1 | 2