Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Database Management Systems | 5 |
Human Factors Engineering | 5 |
Information Technology | 5 |
Information Policy | 3 |
Information Systems | 3 |
Case Studies | 2 |
Computer Security | 2 |
Computer System Design | 2 |
Courseware | 2 |
Educational Needs | 2 |
Information Management | 2 |
More ▼ |
Author
Claybaugh, Craig C. | 1 |
Dimopoulou, Nikoletta | 1 |
Edwards, Gregory | 1 |
Kotsilieris, Theodore | 1 |
Mitchell, Erik | 1 |
Murray, Meg Coffin | 1 |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Reports - Research | 1 |
Education Level
Adult Education | 3 |
Higher Education | 1 |
Audience
Location
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mitchell, Erik – Journal of Web Librarianship, 2011
In mid-April, Amazon EC2 services had a small problem. Apparently, a large swath of its cloud computing environment had such substantial trouble that a number of customers had server issues. A number of high-profile sites, including Reddit, Evite, and Foursquare, went down when Amazon experienced issues in their US East 1a region (Justinb 2011).…
Descriptors: Human Factors Engineering, Computer System Design, Online Systems, Gateway Systems
Kotsilieris, Theodore; Dimopoulou, Nikoletta – Electronic Journal of e-Learning, 2013
Information and Communication Technologies (ICT) offer new approaches towards knowledge acquisition and collaboration through distance learning processes. Web-based Learning Management Systems (LMS) have transformed the way that education is conducted nowadays. At the same time, the adoption of Virtual Worlds in the educational process is of great…
Descriptors: Electronic Learning, Educational Development, Virtual Classrooms, Distance Education
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Claybaugh, Craig C. – ProQuest LLC, 2010
Technology upgrades are an inevitable part of dealing with any man-made invention utilized for productive gain. One key technology used for productive gain within a firm is enterprise software, specifically a firm's Enterprise Resource Planning (ERP) system. After the adoption of an ERP system, an organization is perpetually faced with the…
Descriptors: Computer Software, Program Effectiveness, Environmental Influences, Technological Advancement