Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Administration | 11 |
| Computer Security | 11 |
| Information Management | 5 |
| Information Technology | 5 |
| Higher Education | 4 |
| Internet | 3 |
| Strategic Planning | 3 |
| Technological Advancement | 3 |
| Access to Information | 2 |
| Artificial Intelligence | 2 |
| Automation | 2 |
| More ▼ | |
Source
| Computers in Libraries | 2 |
| Chronicle of Higher Education | 1 |
| Community College Journal | 1 |
| EDUCAUSE Quarterly | 1 |
| International Association for… | 1 |
| Microform and Imaging Review | 1 |
| ProQuest LLC | 1 |
Author
| Akins, M. L. | 1 |
| Amoroso, Donald | 1 |
| Anderson, Greg | 1 |
| Brobst, Jan | 1 |
| Clebsch, William | 1 |
| Council, Chip | 1 |
| Dougherty, Jennifer Dowling | 1 |
| Fischman, Josh | 1 |
| Gonzalez, Pedro | 1 |
| Griffin, J. R. | 1 |
| Khosrowpour, Mehdi | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 6 |
| Reports - Descriptive | 6 |
| Books | 2 |
| Collected Works - General | 1 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
| Guides - Non-Classroom | 1 |
| Information Analyses | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 4 |
| Elementary Secondary Education | 1 |
| Postsecondary Education | 1 |
| Two Year Colleges | 1 |
Audience
| Administrators | 1 |
| Media Staff | 1 |
| Practitioners | 1 |
Location
| Spain | 2 |
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| California | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Taylor, Richard G. – ProQuest LLC, 2009
With the increasing amount and severity of information security incidents, organizations are constantly looking for better ways to protect their information. The implementation of physical safeguards such as firewalls and intrusion detection systems is an integral part on an organization's overall information security; however these safeguards…
Descriptors: Employees, Job Satisfaction, Incentives, Motivation
Fischman, Josh – Chronicle of Higher Education, 2007
The Internet has great difficulty coping with the sharp increase in mobile devices like cellphones and laptops, and handling bandwidth-hungry traffic such as video, now demanded by an increasing number of users. According to Ellen W. Zegura, chairwoman of computer sciences at the Georgia Institute of Technology, the Internet is like a big…
Descriptors: Internet, Technological Advancement, Computer Science, Computer Security
Brobst, Jan; Council, Chip – Community College Journal, 2005
The discussion in this article is intended to provide an examination of why top management, IT management, and internal auditors should be interested in IT governance. Some aspects of IT management will be described including implementation, auditing, availability, security, and alignment. One governance framework, COBIT, will be utilized as a…
Descriptors: Audits (Verification), Information Technology, Administration, Governance
Akins, M. L.; Griffin, J. R. – Computers in Libraries, 1999
Presents the main ingredients for successful computer-systems administration. Discusses training and ongoing support, change management for system upgrades, developing a problem-reporting form and keeping the documentation history, managing technical support, and having a disaster-recovery plan. (AEF)
Descriptors: Administration, Change Strategies, Computer Oriented Programs, Computer Security
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration
Peer reviewedGonzalez, Pedro – Microform and Imaging Review, 1999
Discusses the digital-image storage system at the Archivo General de Indias (Seville) that was developed to conserve original documents and to provide optimal access by researchers. Highlights include image quality, storage medium, computer equipment, remote access, security problems, problems of intellectual property and document ownership,…
Descriptors: Access to Information, Administration, Automation, Computer Security
Nyerges, Mike – Computers in Libraries, 1999
Describes one public school library's struggles and solutions to problems associated with managing its new Windows desktop. To implement goals for organizing the desktop, the library selected the FoolProof desktop security system, utilized networks administration to enforce the school's Acceptable Use Policy, and used Windows 95 System Policies.…
Descriptors: Administration, Computer Networks, Computer Security, Computer System Design
Khosrowpour, Mehdi; Amoroso, Donald – 1991
With the realization that microcomputers provide an extraordinary value to the organization follows the need to address a variety of issues in order to more effectively manage these resources. Each of the 14 chapters, consisting of papers written by different authors, represents a different perspective existing in organizations with respect to the…
Descriptors: Administration, Artificial Intelligence, Computer Science Education, Computer Security
New York State Office of the Comptroller, Albany. Div. of Management Audit. – 2000
This audit report of the State University of New York (SUNY) College of Agriculture and Technology at Morrisville addresses the question of whether the college management has established an effective system of internal control over its revenue, equipment, and student work-study payroll. The audit makes a number of observations and conclusions.…
Descriptors: Accountability, Administration, Computer Security, Educational Finance
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Direct link
