Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Software Evaluation | 6 |
Computer System Design | 6 |
Information Management | 6 |
Database Management Systems | 3 |
Information Systems | 3 |
Computer Uses in Education | 2 |
Information Policy | 2 |
Information Technology | 2 |
Investigations | 2 |
Statistical Analysis | 2 |
Web Sites | 2 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Gray, Paul | 1 |
Jackson, Larry S. | 1 |
Jukic, Nenad | 1 |
Phuwanartnurak, Jiranida | 1 |
Yares, Ali Chava Kaufman | 1 |
Publication Type
Dissertations/Theses -… | 4 |
Book/Product Reviews | 1 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Adult Education | 1 |
Elementary Secondary Education | 1 |
Higher Education | 1 |
Audience
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Phuwanartnurak, Jiranida – ProQuest LLC, 2013
Interdisciplinary design presents challenges in design collaboration due to the difficulty in communicating and coordinating among disciplines. Many tools have been developed and used to support information sharing in design, and the use of Web technology is becoming increasingly important for the sharing of information within design teams. Wikis…
Descriptors: Interdisciplinary Approach, Information Dissemination, Web 2.0 Technologies, Design
Yares, Ali Chava Kaufman – ProQuest LLC, 2010
Information is everywhere and finding the best method to manage it is a problem that all types of organizations have to deal with. Schools use Student Information Systems (SIS) to manage Student Data, Financial Information, Development, Human Resources, Admission, Financial Aid, Enrollment, Scheduling, and Health Information. A survey of 107…
Descriptors: Private Schools, Education, Information Systems, Databases
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government
Jukic, Nenad; Gray, Paul – Journal of Information Systems Education, 2008
This paper describes the value that information systems faculty and students in classes dealing with database management, data warehousing, decision support systems, and related topics, could derive from the use of the Teradata University Network (TUN), a free comprehensive web-portal. A detailed overview of TUN functionalities and content is…
Descriptors: Decision Support Systems, Information Systems, Learning Processes, Computer Software Evaluation
Alberta Dept. of Education, Edmonton. – 1991
An important goal of the Educational Information Exchange (EIE) of Alberta Education is to provide leadership in promoting school student record automation. This document presents a mechanism for the review, evaluation, and recommendation of school-based student records software for the EIE. The report provides an overview of the initiative to…
Descriptors: Automation, Computer Software Evaluation, Computer System Design, Computer Uses in Education