Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 20 |
Descriptor
Source
Author
Hawkins, Brian L. | 3 |
Rudy, Julia A. | 3 |
Herther, Nancy | 2 |
Nickerson, Gord | 2 |
Swain, Leigh | 2 |
Yang, Catherine | 2 |
Agee, Anne Scrivener | 1 |
Alley, Lee | 1 |
Anderl, R. | 1 |
Anderson, Greg | 1 |
Anderson, Sharolyn | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 18 |
Postsecondary Education | 7 |
Adult Education | 1 |
Two Year Colleges | 1 |
Location
Canada | 5 |
United States | 4 |
Australia | 2 |
United Kingdom | 2 |
Virginia | 2 |
Arkansas | 1 |
China | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Netherlands | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
VanderClock, William – Information Systems Education Journal, 2015
Most freshmen taking required, introductory information systems courses do not understand why they are required to take such courses and can't imagine that they will learn anything they don't already know. This paper presents an exercise that will excite and enthuse students about their computers and Information Systems in general. Every freshman…
Descriptors: College Freshmen, Computer Literacy, Information Systems, Technological Literacy
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Tan, Grace; Venables, Anne – Journal of Information Technology Education, 2010
Since 2001, there has been a dramatic decline in Information Technology and Computer Science student enrolments worldwide. As a consequence, many institutions have evaluated their offerings and revamped their programs to include units designed to capture students' interests and increase subsequent enrolment. Likewise, at Victoria University the…
Descriptors: Curriculum Development, Information Technology, Curriculum Design, Computer Science Education
Ingerman, Bret L.; Yang, Catherine – EDUCAUSE Review, 2010
The eleventh annual EDUCAUSE Current Issues Survey shows some very familiar themes among the top-ten IT issues of strategic importance to technology leaders in higher education. Indeed, all ten of the issues from the 2009 survey are back, albeit in a slightly different order. In addition, Strategic Planning returns as an issue of renewed…
Descriptors: Higher Education, Information Technology, Needs Assessment, Context Effect
Platt, Richard G.; Carper, William B.; McCool, Michael – Journal of Information Systems Education, 2010
In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…
Descriptors: Information Technology, Internet, Case Studies, Access to Information
Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie – EDUCAUSE Quarterly, 2008
Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…
Descriptors: Small Colleges, Educational Technology, Information Technology, School Policy
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Agee, Anne Scrivener; Yang, Catherine – EDUCAUSE Review, 2009
This article presents the top-ten IT-related issues in terms of strategic importance to the institution, as revealed by the tenth annual EDUCAUSE Current Issues Survey. These IT-related issues include: (1) Funding IT; (2) Administrative/ERP Information Systems; (3) Security; (4) Infrastructure/Cyberinfrastructure; (5) Teaching and Learning with…
Descriptors: Higher Education, Information Technology, Integrated Learning Systems, Financial Support
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2008
EDUCAUSE Core Data Service Fiscal Year 2007 Summary Report summarizes much of the data collected through the 2007 EDUCAUSE core data survey about campus information technology (IT) environments at 994 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification