NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, Erik – Journal of Web Librarianship, 2011
In mid-April, Amazon EC2 services had a small problem. Apparently, a large swath of its cloud computing environment had such substantial trouble that a number of customers had server issues. A number of high-profile sites, including Reddit, Evite, and Foursquare, went down when Amazon experienced issues in their US East 1a region (Justinb 2011).…
Descriptors: Human Factors Engineering, Computer System Design, Online Systems, Gateway Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kotsilieris, Theodore; Dimopoulou, Nikoletta – Electronic Journal of e-Learning, 2013
Information and Communication Technologies (ICT) offer new approaches towards knowledge acquisition and collaboration through distance learning processes. Web-based Learning Management Systems (LMS) have transformed the way that education is conducted nowadays. At the same time, the adoption of Virtual Worlds in the educational process is of great…
Descriptors: Electronic Learning, Educational Development, Virtual Classrooms, Distance Education
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Claybaugh, Craig C. – ProQuest LLC, 2010
Technology upgrades are an inevitable part of dealing with any man-made invention utilized for productive gain. One key technology used for productive gain within a firm is enterprise software, specifically a firm's Enterprise Resource Planning (ERP) system. After the adoption of an ERP system, an organization is perpetually faced with the…
Descriptors: Computer Software, Program Effectiveness, Environmental Influences, Technological Advancement