NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Waters, John K. – Campus Technology, 2013
The latest data alert: By 2020, the amount of data generated daily will reach 40 zettabytes, or roughly 5,247 gigabytes for every person on earth. That's one of the findings in a new report published by IT industry analysts at IDC. The study casts doubt on the ability to capture the value of all this data, especially since schools barely tapped…
Descriptors: Information Management, Data, Data Collection, Data Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Fredette, Michelle – Campus Technology, 2011
In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…
Descriptors: Internet, Educational Technology, Information Technology, Performance Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Cobb, Chris – Perspectives: Policy and Practice in Higher Education, 2012
Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…
Descriptors: Management Information Systems, Foreign Countries, Computer Interfaces, Technology Uses in Education
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government
Peer reviewed Peer reviewed
Direct linkDirect link
Bray, Marty; Flowers, Claudia; Gibson, Patricia – Information Technology in Childhood Education Annual, 2003
Many school districts (SDs) use the World Wide Web (WWW or Web) to disseminate a wide variety of information about things such as district events, policies, and a wide variety of student information. On-line barriers limit the accessibility of the WWW for persons and students with disabilities and thus can limit their access to vital information.…
Descriptors: School Districts, Foreign Countries, Internet, Comparative Education