Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
EDUCAUSE Quarterly | 7 |
Author
Arseniev, Marina | 1 |
Askren, Mark | 1 |
Awidi, Isaiah T. | 1 |
Barry, Jim | 1 |
Bennett, Cedric | 1 |
BrckaLorenz, Allison | 1 |
Choy, Sheung-On | 1 |
Griggs, Tyler J. | 1 |
Guidry, Kevin R. | 1 |
Ng, Sin-Chun | 1 |
Paine, Thomas A. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 4 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 3 |
Location
California | 1 |
Ghana | 1 |
Hong Kong | 1 |
Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
National Survey of Student… | 1 |
What Works Clearinghouse Rating
Paine, Thomas A.; Griggs, Tyler J. – EDUCAUSE Quarterly, 2008
Educational institutions today face budgetary restraints and scarce resources, complicating the decision of how to allot bandwidth for campus network users. Additionally, campus concerns over peer-to-peer networking (specifically outbound Internet traffic) have increased because of bandwidth and copyright issues. In this article, the authors…
Descriptors: Management Systems, Schools, Computer Software, Internet
Guidry, Kevin R.; BrckaLorenz, Allison – EDUCAUSE Quarterly, 2010
This study extends the research into faculty and student use of contemporary academic technologies. The goals of the study are threefold. First, the study aims to unpack which technologies students and faculty use, and how often. Second, it aims to understand their experiences in the contexts in which they live them. Finally, it explores the…
Descriptors: Computer Uses in Education, Educational Technology, Technology Integration, Management Systems
Awidi, Isaiah T. – EDUCAUSE Quarterly, 2008
Course management systems (CMSs) currently drive educational delivery in most developed countries. Their absence in higher education in most developing countries creates a digital divide between first- and third-world students. Meeting the needs of higher education in Ghana therefore depends on identifying the factors that should inform the choice…
Descriptors: Higher Education, Management Systems, Foreign Countries, Computer Software
Askren, Mark; Arseniev, Marina – EDUCAUSE Quarterly, 2004
With a new wave of campus IT solutions comes a familiar challenge: How does one encourage and help build distributed applications without being overrun by stovepipe solutions? Anticipating significant enrollment growth (5 percent per year) for the next several years, double-digit annual growth in funded research, and little chance that resources…
Descriptors: Higher Education, Information Technology, Management Systems, College Administration
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
Choy, Sheung-On; Ng, Sin-Chun; Tsang, Yiu-Chung – EDUCAUSE Quarterly, 2005
The Open University of Hong Kong (OUHK) is a distance education university with about 22,500 students. In fulfilling its mission, the university has adopted various Web-based and electronic means to support distance learning. For instance, OUHK uses a Web-based course management system (CMS) to provide students with a flexible way to obtain course…
Descriptors: Management Systems, Open Universities, Distance Education, Web Based Instruction
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration