NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sisi Fan – International Journal of Information and Communication Technology Education, 2023
The purpose of this article is to discuss the innovation and development of university education management informationization construction in the context of big data. Through a comprehensive comparison of innovative and traditional university education management information systems, it reveals the advantages of the innovative model in terms of…
Descriptors: Management Information Systems, College Administration, Innovation, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Browne, Liz; Rayner, Steve – Educational Management Administration & Leadership, 2015
The contemporary English policy discourse in higher education of "Putting Students at the Heart of the System" has led to an increasing use of managing by performance "smart-data" reinforcing a consumer-led representation of students as "partners" in the "business of learning" within the academy. This…
Descriptors: Foreign Countries, College Administration, Instructional Leadership, Data
Board of Governors, State University System of Florida, 2014
Information Resource Management--State University System of Florida (IRM-SUS) is the primary collector and provider of data concerning state universities that is used to make sound education policy decisions. The office provides technical assistance to those using the information, state and federal reporting support, those supplying information,…
Descriptors: Higher Education, Conferences (Gatherings), Workshops, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Hurley, Chuck – College and University, 2009
Fear is an interesting word. Especially, when contemplating the contemporary collegiate registrar. The registrar profession seemed to diverge over the last decade. There appears now to be two categories. One is a benevolent person who honors traditional registrar standards, yet does little to grow the profession. The second is an ambassador of…
Descriptors: Higher Education, College Administration, Information Management, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Arevalillo-Herraez, Miguel; Moreno-Clari, Paloma; Cerveron-Lleo, Vicente – Educational Technology Research and Development, 2011
Most universities use Information Systems (IS) to perform their daily administrative activities (student enrollment, data files, accountancy, etc.), and an integrated Learning Management System (LMS) to support teaching and learning. However, although a lot of effort has been put into deploying these computerized systems, the data that they…
Descriptors: Program Descriptions, Management Information Systems, College Administration, Data
Howard, Richard D.; And Others – CAUSE/EFFECT, 1989
The distribution of databases physically separates users from those who administer the database and the administrators who perform database administration. By drawing on the work of social scientists in reliability and validity, a set of concepts and a list of questions to ensure data quality were developed. (Author/MLW)
Descriptors: College Administration, Computers, Data, Databases
Kenepp, Paul L. – 1976
With increasingly large quantities of management-oriented information being produced for decision-making, administrators are finding that they have insufficient time to adequately review and digest its meaning. This paper discusses the development of a computerized graphics system that will permit nearly all types of management information to be…
Descriptors: College Administration, Computer Graphics, Data, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration