Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Access to Information | 4 |
Information Systems | 4 |
Systems Analysis | 4 |
Confidentiality | 2 |
Decision Making | 2 |
Information Management | 2 |
Local Area Networks | 2 |
Microcomputers | 2 |
Public Agencies | 2 |
Systems Building | 2 |
Action Research | 1 |
More ▼ |
Publication Type
Guides - General | 2 |
Journal Articles | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kim, Kihyun; Trimi, Silvana; Park, Hyesung; Rhee, Shanggeun – Decision Sciences Journal of Innovative Education, 2012
Course Management Systems (CMSs) in higher education have emerged as one of the most widely adopted e-learning platforms. This study examines the success of e-learning CMSs based on user satisfaction and benefits. Using DeLone and McLean's information system success model as a theoretical framework, we analyze the success of e-learning CMSs in…
Descriptors: Higher Education, Courseware, Database Management Systems, Electronic Learning
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Helsing, Cheryl; And Others – 1989
The purpose of this guide is to help the policy maker address a series of questions regarding the protection and safety of computer systems and data processed within his/her agency. It introduces information systems security concerns, outlines the management issues that must be addressed by agency policies and programs, and describes the essential…
Descriptors: Access to Information, Confidentiality, Decision Making, Information Management
Crowther, Warren – 1985
The low efficacy of many of the library and large-scale information systems that have been implemented in the developing countries has been disappointing, and their appropriateness is often questioned in the governmental and educational institutions of more industrialized countries beset by budget-crunching and a very dynamic transformation of…
Descriptors: Access to Information, Action Research, Cost Effectiveness, Developing Nations