NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ullman, David F.; Haggerty, Blake – EDUCAUSE Quarterly, 2010
Cloud computing is the latest paradigm shift for the delivery of IT services. Where previous paradigms (centralized, decentralized, distributed) were based on fairly straightforward approaches to technology and its management, cloud computing is radical in comparison. The literature on cloud computing, however, suffers from many divergent…
Descriptors: Figurative Language, Definitions, Program Implementation, Integrated Learning Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
McCardle, Ken – EDUCAUSE Quarterly, 2005
As a CIO leading an IT department through change and reorganization, the author developed the Enterprise Compass--a four-point guide to reaching goals and focusing achievement. The Enterprise Compass directs staff to look forward to future accomplishment, back for performance assessments, across campus for better understanding of practical working…
Descriptors: Technology Planning, Information Technology, Guidelines, Program Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
DeBlois, Peter B. – EDUCAUSE Quarterly, 2005
Just as technology-enhanced teaching and learning has evolved over the past 50 or so years--from overhead projectors and reading machines to PowerPoint presentations, discipline-specific simulations, and Web-based databases--so has support for instructional technology evolved at institutions. The changing rubric of librarian, media specialist,…
Descriptors: Educational Technology, Leadership, Interviews, Instructional Leadership
Peer reviewed Peer reviewed
Direct linkDirect link
Efaw, Jamie – EDUCAUSE Quarterly, 2005
With the infusion of technology into all aspects of daily life, students are becoming more and more adept at using technology as an educational resource. Many faculty, however, are not keeping pace with their students. Additionally, faculty feel increasingly unprepared to integrate technology into the classroom. Many institutions of higher learner…
Descriptors: Educational Technology, Faculty Development, Educational Resources, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Pennock, Lea; Bunt, Rick – EDUCAUSE Quarterly, 2005
Administrative systems renewal is not something the faculty will ever get excited about, but the authors believe there is much that can be done to render the academic community more receptive and even supportive. In this article, the authors use the implementation of their student information system (SIS) at the University of Saskatchewan (and a…
Descriptors: Foreign Countries, Information Systems, Computer System Design, Knowledge Representation
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Trinkle, Dennis A. – EDUCAUSE Quarterly, 2005
Over the past decade, many colleges and universities have invested heavily in information technology in the belief that it would enhance learning and enrich the student experience. Several recent high-profile reports and articles, however, argue that most investments in technology have not paid off. Part of the reason for this pattern of failed…
Descriptors: Teacher Effectiveness, Information Technology, Liberal Arts, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Larsen, Lida – EDUCAUSE Quarterly, 2005
Complementing the need to leverage resources is the academic community's role in providing both academic and workplace learning opportunities and financial assistance to students--who traditionally work part-time, receive lower salaries, and generate fewer overhead costs than their full-time staff counterparts. It is not surprising, therefore,…
Descriptors: Student Employment, Employment Programs, Supervision, Departments