Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Administration | 6 |
Computer Security | 6 |
Higher Education | 2 |
Information Management | 2 |
Information Technology | 2 |
Internet | 2 |
Access to Information | 1 |
Administrators | 1 |
Audits (Verification) | 1 |
Automation | 1 |
Benchmarking | 1 |
More ▼ |
Source
Computers in Libraries | 2 |
Chronicle of Higher Education | 1 |
Community College Journal | 1 |
EDUCAUSE Quarterly | 1 |
Microform and Imaging Review | 1 |
Author
Akins, M. L. | 1 |
Anderson, Greg | 1 |
Brobst, Jan | 1 |
Clebsch, William | 1 |
Council, Chip | 1 |
Dougherty, Jennifer Dowling | 1 |
Fischman, Josh | 1 |
Gonzalez, Pedro | 1 |
Griffin, J. R. | 1 |
Nyerges, Mike | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 6 |
Education Level
Higher Education | 3 |
Two Year Colleges | 1 |
Audience
Location
California | 1 |
Iowa | 1 |
Louisiana | 1 |
Massachusetts | 1 |
Spain | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fischman, Josh – Chronicle of Higher Education, 2007
The Internet has great difficulty coping with the sharp increase in mobile devices like cellphones and laptops, and handling bandwidth-hungry traffic such as video, now demanded by an increasing number of users. According to Ellen W. Zegura, chairwoman of computer sciences at the Georgia Institute of Technology, the Internet is like a big…
Descriptors: Internet, Technological Advancement, Computer Science, Computer Security
Brobst, Jan; Council, Chip – Community College Journal, 2005
The discussion in this article is intended to provide an examination of why top management, IT management, and internal auditors should be interested in IT governance. Some aspects of IT management will be described including implementation, auditing, availability, security, and alignment. One governance framework, COBIT, will be utilized as a…
Descriptors: Audits (Verification), Information Technology, Administration, Governance
Akins, M. L.; Griffin, J. R. – Computers in Libraries, 1999
Presents the main ingredients for successful computer-systems administration. Discusses training and ongoing support, change management for system upgrades, developing a problem-reporting form and keeping the documentation history, managing technical support, and having a disaster-recovery plan. (AEF)
Descriptors: Administration, Change Strategies, Computer Oriented Programs, Computer Security
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration

Gonzalez, Pedro – Microform and Imaging Review, 1999
Discusses the digital-image storage system at the Archivo General de Indias (Seville) that was developed to conserve original documents and to provide optimal access by researchers. Highlights include image quality, storage medium, computer equipment, remote access, security problems, problems of intellectual property and document ownership,…
Descriptors: Access to Information, Administration, Automation, Computer Security
Nyerges, Mike – Computers in Libraries, 1999
Describes one public school library's struggles and solutions to problems associated with managing its new Windows desktop. To implement goals for organizing the desktop, the library selected the FoolProof desktop security system, utilized networks administration to enforce the school's Acceptable Use Policy, and used Windows 95 System Policies.…
Descriptors: Administration, Computer Networks, Computer Security, Computer System Design