NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive13
Journal Articles10
Guides - Non-Classroom2
Speeches/Meeting Papers1
Location
Washington1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Neidigh, Robert O.; Langella, Ian M. – Journal of Education for Business, 2020
The fictitious online retailer "Elbe" faces a deterministic demand for products over a geographic area and fulfills this demand using supply nodes and fulfillment centers. Experiential learning using provided solver and ILOG models (available upon request from the authors) for this supply chain allows students to experiment with…
Descriptors: Supply and Demand, Internet, Retailing, Mathematical Applications
Office of Educational Technology, US Department of Education, 2024
The U.S. Department of Education is committed to supporting innovative advances in educational technology to improve teaching and learning across the nation's education systems and to support educators as they incorporate emerging technology into their learning communities. Artificial Intelligence (AI) in education is a complex and rapidly…
Descriptors: Equal Education, Artificial Intelligence, Computer Software, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Galvao, Tulio Acacio Bandeira; Neto, Francisco Milton Mendes; Campos, Marcos Tullyo; Junior, Edson de Lima Cosme – International Journal of Distance Education Technologies, 2012
The increasing demand for Software Engineering professionals, particularly Project Managers, and popularization of the Web as a catalyst of human relations have made this platform interesting for training this type of professional. The authors have observed the widespread use of games as an attractive instrument in the process of teaching and…
Descriptors: Risk Management, Active Learning, Internet, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Custer, William L. – New Directions for Institutional Research, 2010
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Descriptors: Institutional Research, Databases, School Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Suess, Jack; Morooney, Kevin – EDUCAUSE Review, 2009
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
Descriptors: Higher Education, Internet, Computer Software, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Hughes, Stephanie; White, Rebecca J.; Hertz, Giles – Journal of Higher Education Policy and Management, 2008
High-profile criminal acts continue to plague United States (US) college campuses despite recent efforts to implement more aggressive risk mitigation practices, such as criminal background checks. Despite these efforts, incidents such as the most recent shootings at Virginia Polytechnic Institute and State University continue to demonstrate that,…
Descriptors: School Security, Crime, Crime Prevention, Risk Management
Peer reviewed Peer reviewed
Direct linkDirect link
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Panettieri, Joseph C. – Campus Technology, 2006
This article discusses what colleges and universities can learn from Uncle Sam and corporate America when it comes to designing secure networks and ensuring privacy. After all, schools face many of the same privacy and information security challenges seen in the business and government sectors. The fact of the matter is, in the age of cyber crime…
Descriptors: Higher Education, Computer Security, Educational Environment, Computer Software
Whyman, Wynne – Camping Magazine, 2003
A property records system organizes data to be utilized by a camp's facilities department and integrated into other areas. Start by deciding what records to keep and allotting the time. Then develop consistent procedures, including organizing data, creating a catalog, making back-up copies, and integrating procedures. Use software tools. A good…
Descriptors: Camping, Cataloging, Computer Software, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives
Hoyt, Brian R. – 1996
The skills necessary to compete in a fast paced business environment--critical thinking, risk taking, team building, project management, and others--are not and cannot be addressed in the traditional delivery of an undergraduate business course. The Ohio University-Lancaster Management program uses a project based, just-in-time (JIT) approach to…
Descriptors: Business Administration Education, Computer Software, Critical Thinking, Decision Making