Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 16 |
Descriptor
Computer System Design | 19 |
Cost Effectiveness | 19 |
Information Technology | 19 |
Computer Software | 8 |
Technology Planning | 8 |
Computer Networks | 7 |
Information Storage | 7 |
Internet | 7 |
Educational Technology | 6 |
Computer Security | 5 |
Computer Storage Devices | 5 |
More ▼ |
Source
Author
Basak, P. C. | 1 |
Batterton, John | 1 |
Burd, Stephen D. | 1 |
Chebrolu, Shankar Babu | 1 |
Conway, Christopher | 1 |
Demski, Jennifer | 1 |
Douglas, Ian | 1 |
Elbaz, Sohair W. | 1 |
Flaherty, William | 1 |
Forsstrom, Jan | 1 |
Gallenberger, John | 1 |
More ▼ |
Publication Type
Journal Articles | 12 |
Reports - Descriptive | 11 |
Dissertations/Theses -… | 6 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 9 |
Elementary Secondary Education | 3 |
Postsecondary Education | 3 |
Adult Education | 2 |
Audience
Location
India | 1 |
Indiana | 1 |
Massachusetts | 1 |
Minnesota | 1 |
New Mexico | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tadesse, Yohannes – ProQuest LLC, 2012
The importance of information security has made many organizations to invest and utilize effective information security controls within the information systems (IS) architecture. An organization's strategic decisions to secure enterprise-wide services often associated with the overall competitive advantages that are attained through the process of…
Descriptors: Information Security, Computer System Design, Information Systems, Information Technology
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Flaherty, William – School Business Affairs, 2011
Spotsylvania County Public Schools (SCPS) in Virginia uses a document-imaging solution that leverages the features of a multifunction printer (MFP). An MFP is a printer, scanner, fax machine, and copier all rolled into one. It can scan a document and email it all in one easy step. Software is available that allows the MFP to scan bubble sheets and…
Descriptors: Computer System Design, Databases, Computer Uses in Education, School Districts
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security
Chebrolu, Shankar Babu – ProQuest LLC, 2010
Against the backdrop of new economic realities, one of the larger forces that is affecting businesses worldwide is cloud computing, whose benefits include agility, time to market, time to capability, reduced cost, renewed focus on the core and strategic partnership with the business. Cloud computing can potentially transform a majority of the…
Descriptors: Program Effectiveness, Information Technology, Correlation, Internet
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Golden, Elspeth – ProQuest LLC, 2010
In spite of the goodwill and best efforts of software engineers and usability professionals, systems continue to be built and released with glaring usability flaws that are costly and difficult to fix after the system has been built. Although user interface (UI) designers, be they usability or design experts, communicate usability requirements to…
Descriptors: Computer Software, Computer Interfaces, Computer System Design, Usability
Demski, Jennifer – Campus Technology, 2010
As higher education budgets tighten in the ongoing recession, colleges and universities have found themselves questioning, lengthening, and even eliminating tech refresh cycles. Yet how deep an institution cuts into its refresh program can compromise its ability to provide an up-to-date and competitive computing environment for students and a…
Descriptors: Educational Technology, Cost Effectiveness, Information Networks, Technology Planning
Huang, Peng – ProQuest LLC, 2010
Innovation ecosystem strategy is often adopted by platform technology owners to seek complementary innovation from resources located outside the firm to exploit indirect network effect. In this dissertation I aim to address the issues that are related to the formation and business value of platform innovation ecosystems in the enterprise software…
Descriptors: Industry, Intellectual Property, Innovation, Computer Software
Khanna, Pankaj; Basak, P. C. – Turkish Online Journal of Distance Education, 2011
It is proposed to establish an Integrated Distance Education System in India by designing modern technology based information communication network, connecting all its ODL (Open and Distance Learning) institutions to the headquarters of the ODL system in India. The principle roles to be performed by such a system have been discussed; according to…
Descriptors: Foreign Countries, Distance Education, Educational Technology, Cost Effectiveness
Wheeler, Brad; Waggener, Shelton – EDUCAUSE Review, 2009
The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…
Descriptors: Higher Education, Internet, Computer Software, Computers
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Ross, Virginia Watson – ProQuest LLC, 2010
Cloud computing is a growing field, addressing the market need for access to computing resources to meet organizational computing requirements. The purpose of this research is to evaluate the factors that influence an organization in their decision whether to adopt cloud computing as a part of their strategic information technology planning.…
Descriptors: Technology Planning, Information Technology, Internet, Strategic Planning
Liu, Yipeng – ProQuest LLC, 2009
Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…
Descriptors: Information Technology, Competition, Computer Software, Cost Effectiveness
Elbaz, Sohair W.; Stewart, Christofer – 1999
This paper provides an overview of thin-client/server computing in higher education. Thin-clients are like PCs in appearance, but they do not house hard drives or localized operating systems and cannot function without being connected to a server. Two types of thin-clients are described: the Network Computer (NC) and the Windows Terminal (WT).…
Descriptors: Academic Libraries, Comparative Analysis, Computer Software, Computer System Design
Previous Page | Next Page ยป
Pages: 1 | 2