NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)11
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rosli, D'oria Islamiah – Turkish Online Journal of Educational Technology - TOJET, 2015
Human error is a crucial problem in manufacturing industries. Due to the misinterpretation of information on interface system design, accidents or death may occur at workplace. Lack of human cognition criteria in interface system design is also one of the contributions to the failure in using the system effectively. Therefore, this paper describes…
Descriptors: Manufacturing, Industry, Information Technology, Engineering
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Albert – Journal of Educational Technology Systems, 2012
Information technology (IT) is an essential part of modern education. The roles and contributions of technology to education have been thoroughly documented in academic and professional literature. Despite the benefits, the use of educational technology systems (ETS) also creates a significant impact on the environment, primarily due to energy…
Descriptors: Energy Conservation, Educational Technology, Systems Development, Sustainable Development
Flaherty, William – School Business Affairs, 2011
Technology is a critical component in the success of any high-functioning school district, thus it is important that education leaders should examine it closely. Simply put, the purpose of a technology audit is to assess the effectiveness of the technology for administrative or instructional use. Rogers Public Schools in Rogers, Arkansas, recently…
Descriptors: Educational Technology, Technology Integration, Scoring Rubrics, Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Bederson, Benjamin B. – Behaviour & Information Technology, 2011
Zoomable user interfaces (ZUIs) have received a significant amount of attention in the 18 years since they were introduced. They have enjoyed some success, and elements of ZUIs are widely used in computers today, although the grand vision of a zoomable desktop has not materialised. This paper describes the premise and promise of ZUIs along with…
Descriptors: Design Requirements, Computer Interfaces, Innovation, Research and Development
Peer reviewed Peer reviewed
Direct linkDirect link
Exter, Marisa; Turnage, Nichole – ACM Transactions on Computing Education, 2012
This exploratory qualitative study examines computing professional's memories of their own formal and non-formal educational experiences, their reflections on how these have prepared them for their professional roles, and their recommendations for an "ideal" undergraduate degree program. Data was collected through semi-structured interviews of…
Descriptors: Qualitative Research, Grounded Theory, Data Analysis, Questionnaires
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Starr, Joan – Computers in Libraries, 2010
In October 2009, California Digital Library (CDL), where the author serves as manager of strategic and project planning, jumped into the world of social networking by joining Twitter. From Twitter, the CDL staff publish the content of their monthly newsletter, "CDLINFO News," and also additional content created by CDL programs and…
Descriptors: Electronic Libraries, Information Technology, Database Management Systems, Social Networks
Schaffhauser, Dian – Campus Technology, 2010
As influenza activity throughout the United States continues its gradual rise, H1N1 in particular has been the risk-management topic of the season for most colleges and universities. Among the questions being asked: Can one continue operations in the event of a campus closure? What if a faculty member is too sick to teach? What if students refuse…
Descriptors: Risk Management, College Administration, Information Technology, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
Department of Education, Washington, DC. – 1998
This kit was developed to assist the postsecondary education community's efforts to resolve the Year 2000 (Y2K) computer problem. The kit includes a description of the Y2K problem, an assessment of the readiness of colleges and universities, a checklist for institutions, a Y2K communications strategy, articles on addressing the problem in academic…
Descriptors: Change Strategies, Computer System Design, Educational Planning, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Vrasidas, Charalambos – Computers in the Schools, 2003
The purpose of this paper is to present the Large Unit District Association virtual high school (LUDA-VHS) project and discuss its design, development, and implementation. A model developed at the Center for the Application of Information Technologies for designing online classes will be presented and discussed. The focus of the paper will be to…
Descriptors: Educational Strategies, Online Courses, Information Technology, Distance Education
Peer reviewed Peer reviewed
Shaw, Debora – Annual Review of Information Science and Technology, 1991
Discusses the human-computer interface as it relates to information technology and retrieval. Principles of interface design are examined, including visual display features and help messages; information retrieval applications are described, including online searching, CD-ROM, online public access catalogs (OPACs), and full-text databases; and…
Descriptors: Computer System Design, Evaluation Criteria, Full Text Databases, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy