NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Webster, Sally – CAUSE/EFFECT, 1989
The 1989 computer "worm" resulted in some needed attention to computer security. Academic computing has the goal of integrating computing into the fabric of teaching, learning, and research, and must be relatively open. Ways to raise awareness of ethical and social issues are described. (MLW)
Descriptors: Computer Software, Confidential Records, Ethics, Higher Education
Brown, Jana; O'Connell, John – CAUSE/EFFECT, 1989
The acquisition and implementation at Arizona State University of a fourth-generation language product to facilitate end-user access to institutional data are described. Some problems encountered are included, as are discussions of training and security considerations. (Author/MLW)
Descriptors: Computer Centers, Computer Software, Databases, Evaluation Criteria
Haugen, Elliott J.; Nedwek, Brian P. – CAUSE/EFFECT, 1988
The use of prototyping and simulation at St. Louis University to evaluate the implementation decisions and design of a student information system are described with regard to their impact on, and interaction with, institutional policies and procedures. (Author/MLW)
Descriptors: College Administration, College Students, Computer Software, Decision Making