NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tan, Kar Way; Shankararaman, Venky – Journal of Information Systems Education, 2014
It was 2:35 am on a Saturday morning. Wiki Lim, process specialist from the Process Innovation Centre (PIC) of Hippi Care Hospital (HCH), desperately doodling on her notepad for ideas to improve service delivery at HCH's Emergency Department (ED). HCH has committed to the public that its ED would meet the service quality criterion of serving 90%…
Descriptors: Systems Development, Systems Analysis, Performance Technology, Health Education
Anderson, George W. – ProQuest LLC, 2010
The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…
Descriptors: Program Effectiveness, Statistical Analysis, Transformational Leadership, Information Technology
Ross, Virginia Watson – ProQuest LLC, 2010
Cloud computing is a growing field, addressing the market need for access to computing resources to meet organizational computing requirements. The purpose of this research is to evaluate the factors that influence an organization in their decision whether to adopt cloud computing as a part of their strategic information technology planning.…
Descriptors: Technology Planning, Information Technology, Internet, Strategic Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Stubbs, Mark; Range, Phil – Campus-Wide Information Systems, 2011
Purpose: The need to establish more flexible and adaptable university curricula has been recognised as a strategic priority in recent years and has been supported by a number of initiatives including the Curriculum Design and Delivery programme funded by the Joint Information System Committee (JISC) in the UK. The challenges of addressing…
Descriptors: Foreign Countries, Curriculum Design, College Curriculum, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Cornforth, David; Atkinson, John; Spennemann, Dirk H. R. – Campus-Wide Information Systems, 2006
Purpose: Many researchers require access to computer facilities beyond those offered by desktop workstations. Traditionally, these are offered either through partnerships, to share the cost of supercomputing facilities, or through purpose-built cluster facilities. However, funds are not always available to satisfy either of these options, and…
Descriptors: Undergraduate Students, Feasibility Studies, Computer Uses in Education, Workstations
Peer reviewed Peer reviewed
Direct linkDirect link
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
Garofalakis, John; Kappos, Panagiotis; Tsakalidis, Athanasios; Tsaknakis, John; Tzimas, Giannis; Vassiliadis, Vassilios – 1997
This paper describes the experience and the problems solved in the process of developing and integrating advanced World Wide Web-based services into the University of Patras (Greece) system. In addition to basic network services (e.g., e-mail, file transfer protocol), the final system will integrate the following set of advanced services: a…
Descriptors: Computer Networks, Computer System Design, Distance Education, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy