Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 6 |
Information Services | 6 |
Information Technology | 6 |
Information Systems | 4 |
Access to Information | 3 |
Internet | 3 |
Colleges | 2 |
Computer Networks | 2 |
Computer Uses in Education | 2 |
Educational Change | 2 |
Higher Education | 2 |
More ▼ |
Author
Carlson, Scott | 1 |
Chang, Carl, Ed. | 1 |
Dawes, Sharon S. | 1 |
DiCaterino, Ann | 1 |
Fischman, Josh | 1 |
Helal, Sumi, Ed. | 1 |
Murai, Jun, Ed. | 1 |
Oie, Yuji, Ed. | 1 |
Pardo, Theresa A. | 1 |
West, Ann | 1 |
Young, Jeffrey R. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 4 |
Journal Articles | 3 |
Speeches/Meeting Papers | 2 |
Books | 1 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services
von Munkwitz-Smith, Jeff; West, Ann – College and University, 2004
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Descriptors: Access to Information, Identification, Information Technology, Educational Policy
Helal, Sumi, Ed.; Oie, Yuji, Ed.; Chang, Carl, Ed.; Murai, Jun, Ed. – 2003
This proceedings from the 2003 Symposium on Applications and the Internet (SAINT) contains papers from sessions on: (1) mobile Internet, including a target-driven cache replacement policy, context-awareness for service discovery, and XML transformation; (2) collaboration technology I, including human-network-based filtering, virtual collaboration…
Descriptors: Computer Oriented Programs, Computer Security, Information Retrieval, Information Services

Dawes, Sharon S.; Pardo, Theresa A.; DiCaterino, Ann – Journal of the American Society for Information Science, 1999
Two Internet testbeds conducted at the New York State Center for Technology in Government (CTG) identified five threshold factors that shape a government agency's ability to initiate Web-based services: technical infrastructure, user capabilities, information content, cost, and security. Six kinds of benefits of the Web to deliver government…
Descriptors: Computer Security, Costs, Federal Government, Federal Programs
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security