NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Whitehouse, Kendall – EDUCAUSE Quarterly, 2006
Most large enterprises now have some type of portal to organize their internal information services. Few, however, have the long history of the SPIKE project at the University of Pennsylvania's Wharton School. Originally developed during the 1994-1995 school year, SPIKE was an intranet information portal before the term "information…
Descriptors: Feedback (Response), Information Systems, Internet, Information Services
Peer reviewed Peer reviewed
Direct linkDirect link
Pennock, Lea; Bunt, Rick – EDUCAUSE Quarterly, 2005
Administrative systems renewal is not something the faculty will ever get excited about, but the authors believe there is much that can be done to render the academic community more receptive and even supportive. In this article, the authors use the implementation of their student information system (SIS) at the University of Saskatchewan (and a…
Descriptors: Foreign Countries, Information Systems, Computer System Design, Knowledge Representation
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy