NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)16
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 39 results Save | Export
Schaffhauser, Dian – Campus Technology, 2012
Half of servers in higher ed are virtualized. But that number's not high enough for Link Alander, interim vice chancellor and CIO at the Lone Star College System (Texas). He aspires to see 100 percent of the system's infrastructure requirements delivered as IT services from its own virtualized data centers or other cloud-based operators. Back in…
Descriptors: Misconceptions, Technology Planning, Best Practices, Technology Uses in Education
Finkel, Ed – District Administration, 2012
Like seemingly everyone else connected to K12 education, vendors that offer student information systems are being called upon to do more with less. Where past generations of these systems focused on nuts and bolts such as time, attendance and behavioral issues, the latest generation has created--and drawn inspiration from--districts' desires for…
Descriptors: Elementary Secondary Education, Information Systems, Human Factors Engineering, Performance Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Mukerjee, Sheila – Journal of Higher Education Policy and Management, 2012
This paper presents a practitioner's view on student system implementations in the Australian university sector. A student information system is a core system of any university and integral to its operations and services to students. These systems are constantly on the list of major projects and at any point in time, a university is either…
Descriptors: Computer Software, Information Systems, Program Implementation, Change Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Guimaraes, E. G.; Cardozo, E.; Moraes, D. H.; Coelho, P. R. – IEEE Transactions on Learning Technologies, 2011
The design and implementation of remote laboratories present different levels of complexity according to the nature of the equipments operated by the remote laboratory, the requirements imposed on the accessing computers, the network linking the user to the laboratory, and the type of experiments the laboratory supports. This paper addresses the…
Descriptors: Laboratories, Client Server Architecture, Program Design, Program Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Bak, Peter; Meyer, Joachim – Behaviour & Information Technology, 2011
Information systems increasingly provide options for visually inspecting data during the process of information discovery and exploration. Little research has dealt so far with user interactions with these systems, and specifically with the effects of characteristics of the displayed data and the user on performance with such systems. The study…
Descriptors: Foreign Countries, Graphs, Criteria, Information Retrieval
Peer reviewed Peer reviewed
Direct linkDirect link
Ramiller, Neil C.; Wagner, Erica L. – Journal of Information Systems Education, 2011
Systems analysis and design is a standard course offering within information systems programs and often an important lecture topic in Information Systems core courses. Given the persistent difficulty that organizations experience in implementing systems that meet their requirements, it is important to help students in these courses get a tangible…
Descriptors: Systems Analysis, Information Systems, Information Technology, Systems Development
Lagoze, Carl Jay – ProQuest LLC, 2010
The idea of Digital Libraries emerged in the early 1990s from a vision of a "library of the future", without walls and open 24 hours a day. These digital libraries would leverage the substantial investments of federal funding in the Internet and advanced computing for the benefit of the entire population. The world's knowledge would be a key press…
Descriptors: Library Research, Popular Culture, Information Systems, Electronic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Greener, Susan – Campus-Wide Information Systems, 2009
Purpose: The purpose of this paper is to reflect on the value and constraints of varied online communication tools from web 2.0 to e-mail in a higher education (HE) teaching and learning context, where these tools are used to support or be the main focus of learning. Design/methodology/approach: A structured reflection is produced with the aid of…
Descriptors: Computer Mediated Communication, Learning Experience, Teaching Methods, Reflection
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Claybaugh, Craig C. – ProQuest LLC, 2010
Technology upgrades are an inevitable part of dealing with any man-made invention utilized for productive gain. One key technology used for productive gain within a firm is enterprise software, specifically a firm's Enterprise Resource Planning (ERP) system. After the adoption of an ERP system, an organization is perpetually faced with the…
Descriptors: Computer Software, Program Effectiveness, Environmental Influences, Technological Advancement
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government
Mattia, Angela Marie – ProQuest LLC, 2009
User participation and its relationship to system success have been discussed in the information systems (IS) literature from many theoretical and practical perspectives. In reality, most of this discussion is grounded in empirical research that has yielded mixed results on the importance of user participation and its relationship to system…
Descriptors: Information Systems, Computer System Design, Investigations, Network Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Griffiths, Jillian R.; Johnson, Frances; Hartley, Richard J. – Journal of Librarianship and Information Science, 2007
It is evident from previous research that user satisfaction is a multidimensional, subjective variable which can be affected by many factors other than performance of the system or searcher. This article draws on information retrieval and information systems literature in an attempt to understand what user satisfaction is, how it is measured, what…
Descriptors: User Satisfaction (Information), Information Systems, Information Retrieval, Investigations
Previous Page | Next Page ยป
Pages: 1  |  2  |  3