Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
College Administration | 7 |
Computer System Design | 7 |
Management Information Systems | 4 |
Computer Networks | 3 |
Computer Software | 3 |
Higher Education | 3 |
Systems Development | 3 |
Case Studies | 2 |
College Planning | 2 |
Computer Security | 2 |
Database Management Systems | 2 |
More ▼ |
Source
EDUCAUSE Quarterly | 2 |
Business Officer | 1 |
Coombe Lodge Report | 1 |
Perspectives: Policy and… | 1 |
ProQuest LLC | 1 |
Author
Barry, Jim | 1 |
Bennett, Cedric | 1 |
Bleed, Ron | 1 |
Cobb, Chris | 1 |
Dubois, Ronald | 1 |
Elhindi, Mohamed A. | 1 |
Finlayson, Jean, Ed. | 1 |
Freeman, Neil | 1 |
Powel, Wayne D. | 1 |
Schroeder, John R. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Collected Works - General | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Audience
Administrators | 2 |
Practitioners | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cobb, Chris – Perspectives: Policy and Practice in Higher Education, 2012
Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…
Descriptors: Management Information Systems, Foreign Countries, Computer Interfaces, Technology Uses in Education
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
Schroeder, John R.; Bleed, Ron – 1996
In January 1994, Arizona's Maricopa Community College District issued a request for proposals to develop new administrative software applications to solve problems related to high maintenance costs for existing systems and difficulties in updating software. The result was the Apollo Project, in which the District contracted with Oracle Corporation…
Descriptors: College Administration, College Planning, Community Colleges, Computer Networks
Dubois, Ronald; Freeman, Neil – Business Officer, 1991
The first part in a two-part series about the development of an integrated management information system at Chaminade University (Hawaii) discusses decisions made about the system's integration and transportability, modularization, programing language, and productivity in the first five years. (MSE)
Descriptors: Case Studies, College Administration, College Planning, Computer Software
Finlayson, Jean, Ed. – Coombe Lodge Report, 1989
This collection of papers addresses key questions facing college managers and others choosing, introducing, and living with big, complex computer-based systems. "What Use the User Requirement?" (Tony Coles) stresses the importance of an information strategy driven by corporate objectives, not technology. "Process of Selecting a…
Descriptors: College Administration, Computer System Design, Evaluation Criteria, Foreign Countries
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration