NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Grayson, Katherine – Campus Technology, 2010
Ever since the first customer relationship management (CRM) tools found their way onto North American campuses around 2002, higher education administrators have cringed at the mention of the word "customer," preferring to substitute "constituent" for the more sales-driven term. Yet, with competition for qualified candidates…
Descriptors: Outreach Programs, Student Personnel Services, School Holding Power, Learner Engagement
Peer reviewed Peer reviewed
Direct linkDirect link
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Pennock, Lea; Bunt, Rick – EDUCAUSE Quarterly, 2005
Administrative systems renewal is not something the faculty will ever get excited about, but the authors believe there is much that can be done to render the academic community more receptive and even supportive. In this article, the authors use the implementation of their student information system (SIS) at the University of Saskatchewan (and a…
Descriptors: Foreign Countries, Information Systems, Computer System Design, Knowledge Representation
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy