Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Networks | 32 |
Computer System Design | 32 |
Information Management | 32 |
Information Technology | 9 |
Higher Education | 8 |
Information Networks | 8 |
Access to Information | 7 |
Computer Uses in Education | 7 |
Information Systems | 7 |
Online Systems | 7 |
Computer Software | 6 |
More ▼ |
Source
Author
McClure, Charles R. | 2 |
Adler, Prudence | 1 |
Ahmed, Pervaiz K. | 1 |
Amin, Rohan Mahesh | 1 |
Aust, Ronald | 1 |
Burns, Lucy | 1 |
Cantor, Scott | 1 |
Carmody, Steven | 1 |
Clark, Jason | 1 |
Cobb, Chris | 1 |
Davies, John | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 8 |
Postsecondary Education | 3 |
Adult Education | 1 |
Audience
Practitioners | 3 |
Media Staff | 1 |
Teachers | 1 |
Location
United Kingdom | 2 |
Kenya | 1 |
Montana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Larney, Sarah; Burns, Lucy – Evaluation Review, 2011
Individuals in contact with the criminal justice system are a key population of concern to public health. Record linkage studies can be useful for studying health outcomes for this group, but the use of aliases complicates the process of linking records across databases. This study was undertaken to determine the impact of aliases on sensitivity…
Descriptors: Criminals, Public Health, Justice, Institutionalized Persons
Klemke, Roland; Ternier, Stefaan; Kalz, Marco; Specht, Marcus – British Journal of Educational Technology, 2010
Making learning objects available is critical to reuse learning resources. Making content transparently available and providing added value to different stakeholders is among the goals of the European Commission's eContentplus programme. This paper analyses standards and protocols relevant for making learning objects accessible in distributed data…
Descriptors: Foreign Countries, Metadata, Educational Resources, Computer Networks
Demirkan, Haluk; Goul, Michael; Gros, Mary – Decision Sciences Journal of Innovative Education, 2010
Many e-learning service systems fail. This is particularly true for those sponsored by joint industry/university consortia where substantial economic investments are required up-front. This article provides an industry/university consortia reference model validated through experiences with the 8-year-old Teradata University Network. The reference…
Descriptors: Sustainability, Electronic Learning, School Business Relationship, Consortia
Cobb, Chris – Perspectives: Policy and Practice in Higher Education, 2012
Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…
Descriptors: Management Information Systems, Foreign Countries, Computer Interfaces, Technology Uses in Education
Sutherland, Michael; Clark, Jason – Computers in Libraries, 2009
Montana State University (MSU) Libraries (where the authors serve as web services librarian and digital initiatives librarian, respectively) is perhaps unique because it has no current periodicals room due to lack of space. As a result, finding current journals for research is difficult for its patrons, who do not always know how or where to…
Descriptors: Journal Articles, Academic Libraries, Electronic Libraries, Computer Networks
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Kahle, Brewster; And Others – Electronic Networking: Research, Applications and Policy, 1992
Describes the Wide Area Information Servers (WAIS) system, an integrated information retrieval system for corporate end users. Discussion covers general characteristics of the system, search techniques, protocol development, user interfaces, servers, selective dissemination of information, nontextual data, access to other servers, and description…
Descriptors: Administrators, Computer Networks, Computer System Design, Information Management
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology
Sadiig, I. Ahmed M. J. – Online Submission, 2005
The traditional learning paradigm involving face-to-face interaction with students is shifting to highly data-intensive electronic learning with the advances in Information and Communication Technology. An important component of the e-learning process is the delivery of the learning contents to their intended audience over a network. A distributed…
Descriptors: Information Services, Educational Technology, Distance Education, Computer Networks
Nyerges, Mike – Computers in Libraries, 1999
Describes one public school library's struggles and solutions to problems associated with managing its new Windows desktop. To implement goals for organizing the desktop, the library selected the FoolProof desktop security system, utilized networks administration to enforce the school's Acceptable Use Policy, and used Windows 95 System Policies.…
Descriptors: Administration, Computer Networks, Computer Security, Computer System Design
Zhang, Zhongdong; Heuer, Andreas; Engel, Thomas; Meinel, Christoph – Proceedings of the ASIS Annual Meeting, 1999
Introduces a Web authoring and publishing system, DAPHNE (Distributed Authoring and Publishing in a Hypertext and Networked Environment). Addresses DAPHNE's system architecture and design principles, key features, new developments--especially those regarding integration of a workflow for management of multilingual Web sites, and the possibility of…
Descriptors: Authoring Aids (Programming), Computer Networks, Computer System Design, Electronic Publishing

Gould, Stephen B. – Government Information Quarterly, 1990
Provides a brief overview of primary computer network structures serving the academic research community and discusses plans for the transformation of Internet into a National Research and Education Network (NREN). The scope of resources likely to be available to users through the NREN are described, the concept of national collaboratives is…
Descriptors: Computer Networks, Computer System Design, Databases, Electronic Mail