Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Higher Education | 3 |
Information Networks | 3 |
Performance Technology | 3 |
Performance Factors | 2 |
Technology Uses in Education | 2 |
Background | 1 |
Barriers | 1 |
Best Practices | 1 |
Campuses | 1 |
Case Method (Teaching… | 1 |
Case Studies | 1 |
More ▼ |
Author
Cundiff, Jacob | 1 |
Grush, Mary, Ed. | 1 |
Havelka, Douglas | 1 |
McCallum, Taylor | 1 |
Rich, Andrew | 1 |
Truax, Michael | 1 |
Villano, Matt | 1 |
Ward, Tamara | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cundiff, Jacob; McCallum, Taylor; Rich, Andrew; Truax, Michael; Ward, Tamara; Havelka, Douglas – Journal of Information Systems Education, 2015
The launch of HealthCare.gov, the website of the Affordable Care Act (AKA Obamacare), was a major public relations disaster for the Obama administration. This case examines some of the factors that contributed to the failure of the launch and then details how Optum, an information technology service provider, considered the opportunity provided by…
Descriptors: Case Studies, Information Systems, Database Management Systems, Online Vendors
Grush, Mary, Ed. – Campus Technology, 2006
Connectivity has dramatically changed the landscape of higher education IT. From "on-demand" services for net-gen students and advanced eLearning systems for faculty, to high-performance computing grid resources for researchers, IT now provides more networked services than ever to connect campus constituents to each other and to the world.…
Descriptors: Higher Education, Internet, Best Practices, Technology Uses in Education
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering