Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
EDUCAUSE Quarterly | 9 |
Author
Aldrich, Alan W. | 1 |
Bennett, Cedric | 1 |
Bunt, Rick | 1 |
Cantor, Scott | 1 |
Carmody, Steven | 1 |
Cohn, Julie | 1 |
Daugherty, Hubert | 1 |
Forsstrom, Jan | 1 |
Gorry, G. Anthony | 1 |
Hacker, Thomas J. | 1 |
Ham, Gary | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 7 |
Reports - Evaluative | 2 |
Education Level
Higher Education | 9 |
Postsecondary Education | 5 |
Audience
Location
Canada | 2 |
Indiana | 1 |
Massachusetts | 1 |
United States | 1 |
Wisconsin | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Aldrich, Alan W. – EDUCAUSE Quarterly, 2010
The convergence of web-enabled smartphones, the applications designed for smartphone interfaces, and cloud computing is rapidly changing how people interact with each other and with their environments. The commercial sector has taken the lead in creating mobile websites that leverage the capacities of smartphones, and the academic community has…
Descriptors: Foreign Countries, Research Universities, Internet, Handheld Devices
Riley, Cathy – EDUCAUSE Quarterly, 2005
When Annie Stunden came to the University of Wisconsin-Madison (UW-Madison) in 1999 as CIO, she had a vision of providing all students, faculty, and staff their own Web sites where they could store and share documents and files, a place where they could easily and intuitively collaborate with each other. Before joining UW-Madison, Stunden had been…
Descriptors: Higher Education, Information Technology, College Administration, Educational Technology
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology
Forsstrom, Jan; Ham, Gary – EDUCAUSE Quarterly, 2007
Five years ago, North Shore Community College (NSCC) encountered rising enrollments in the face of lagging state funding. The addition of two new campuses stretched NSCC thin as it attempted to provide administrative and academic services across five (more recently consolidated to four) locations. Its students increasingly struggled to balance the…
Descriptors: Community Colleges, Multicampus Colleges, Information Technology, Web Sites
Daugherty, Hubert; Cohn, Julie; Gorry, G. Anthony – EDUCAUSE Quarterly, 2004
Universities increasingly employ information technology to distribute elements of their educational programs beyond campus borders and to find new uses for the intellectual capital they produce. Some faculty, with varying support and success, are moving course materials--and sometimes courses themselves--to the Internet to reach wider audiences.…
Descriptors: Information Technology, Educational Technology, Aptitude Treatment Interaction, Knowledge Management
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Pennock, Lea; Bunt, Rick – EDUCAUSE Quarterly, 2005
Administrative systems renewal is not something the faculty will ever get excited about, but the authors believe there is much that can be done to render the academic community more receptive and even supportive. In this article, the authors use the implementation of their student information system (SIS) at the University of Saskatchewan (and a…
Descriptors: Foreign Countries, Information Systems, Computer System Design, Knowledge Representation
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy