NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Fredette, Michelle – Campus Technology, 2011
In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…
Descriptors: Internet, Educational Technology, Information Technology, Performance Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Kesner, Richard M.; Russell, Bruce – Journal of Information Systems Education, 2009
The "FastFit Case Study" and its companion, the "Winter Gear Distributors Case Study" provide undergraduate business students with a suitable and even familiar business context within which to initially consider the role of information management (IM) and to a lesser extent the role of information technology (IT) systems in enabling a business.…
Descriptors: Information Management, Information Technology, Case Studies, Discussion (Teaching Technique)
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Raths, David – Campus Technology, 2008
With the widespread digitization of art, photography, and music, plus the introduction of streaming video, many colleges and universities are realizing that they must develop or purchase systems to preserve their school's digitized objects; that they must create searchable databases so that researchers can find and share copies of digital files;…
Descriptors: Information Management, Information Technology, Performance Technology, Technology Integration