Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer System Design | 17 |
Information Technology | 17 |
Program Implementation | 17 |
Computer Software | 7 |
Educational Technology | 7 |
Internet | 7 |
Computer Uses in Education | 6 |
Foreign Countries | 6 |
Higher Education | 6 |
Information Systems | 6 |
Barriers | 4 |
More ▼ |
Source
Author
Abaas, Kanari | 1 |
Bao, Zhen | 1 |
Bridgewater, Rachel | 1 |
Bunt, Rick | 1 |
Chen, Sheng-Chang | 1 |
Deitering, Anne-Marie | 1 |
Dow, Chyi-Ren | 1 |
Gupta, Jatinder N. D. | 1 |
Hsu, Fu-Wei | 1 |
Janovsky, Kathy | 1 |
Ju, Bo | 1 |
More ▼ |
Publication Type
Journal Articles | 14 |
Reports - Descriptive | 7 |
Reports - Evaluative | 4 |
Reports - Research | 3 |
Dissertations/Theses -… | 2 |
Guides - Non-Classroom | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 5 |
Elementary Secondary Education | 3 |
Secondary Education | 1 |
Audience
Media Staff | 2 |
Practitioners | 2 |
Administrators | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abaas, Kanari – ProQuest LLC, 2009
IT has permeated to the very roots of organizations and has an ever increasingly important role in the achievement of overall corporate objectives and business strategies. This paper presents an approach for evaluating the impact of existing Enterprise Architecture (EA) implementations. The papers answers questions such as: What are the challenges…
Descriptors: Information Technology, Program Implementation, Program Evaluation, Evaluation Methods
Yares, Ali Chava Kaufman – ProQuest LLC, 2010
Information is everywhere and finding the best method to manage it is a problem that all types of organizations have to deal with. Schools use Student Information Systems (SIS) to manage Student Data, Financial Information, Development, Human Resources, Admission, Financial Aid, Enrollment, Scheduling, and Health Information. A survey of 107…
Descriptors: Private Schools, Education, Information Systems, Databases
Liu, Xiaolei; Liu, Haitao; Bao, Zhen; Ju, Bo; Wang, Zhenghong – Computers & Education, 2010
Self-testing is a means to check learning effect. Besides time-space restriction, there are many deficiencies in traditional offline self-testing. With the development of information technology, learners can have self-testing on the Internet. Self-testing on Internet, namely, web-based self-testing, overcomes time-space limitation of traditional…
Descriptors: Feedback (Response), Constructivism (Learning), Social Environment, Testing
Li, Yi-Hsung; Dow, Chyi-Ren; Lin, Cheng-Min; Chen, Sheng-Chang; Hsu, Fu-Wei – International Journal of Distance Education Technologies, 2009
Innovations in network and information technology have transformed traditional classroom lectures into new approaches that have given universities the opportunity to create a virtual laboratory. However, there is no systematic framework in existing approaches for the development of virtual laboratories. Further, developing a virtual laboratory…
Descriptors: Laboratories, Program Development, Program Implementation, College Instruction
Deitering, Anne-Marie; Bridgewater, Rachel – Journal of Web Librarianship, 2007
This article details the development of the Library Instruction Wiki (http://instructionwiki.org): an effort to develop a web-based, knowledge-sharing resource. Though some library instruction is specific to a given institution or class, much of what instruction librarians teach is similar. Library instructors have repeatedly expressed the desire…
Descriptors: Knowledge Management, Information Technology, Educational Technology, Library Instruction
Matey, John G. – School Business Affairs, 1990
Outlines a systematic approach for evaluating the needs and potential problems involved when school districts seek to update their current information systems. Considers the following components: financial, technical, computer literacy, and information system management infrastructure. (MLF)
Descriptors: Computer Literacy, Computer System Design, Computer Uses in Education, Elementary Secondary Education
Lam, Wing – Journal of Information Systems Education, 2007
Increasingly, organizations find that they need to integrate large number of information systems in order to support enterprise-wide business initiatives such as e-business, supply chain management and customer relationship management. To date, organizations have largely tended to address information systems (IS) integration in an ad-hoc manner.…
Descriptors: Financial Services, Information Systems, Foreign Countries, Systems Approach

Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Ullmann, Jill – Online Journal of Distance Learning Administration, 2009
Universities are quickly moving from brick and mortar toward online classroom settings. The online setting provides students with increased accessibility and flexibility to attend classes they would normally be unable to attend. Unfortunately, for those students who never attend classes on campus, many campus resources are not accessible. Students…
Descriptors: Distance Education, Nursing Education, Adult Learning, Adult Students
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design

Wachter, Renee M.; Gupta, Jatinder N. D. – Computers & Education, 1997
Examines whether the technological development of expert systems can be achieved successfully by students in distance instruction, and differences between distance learning and traditional campus education. Results suggest that not only can successful systems development be achieved but that the hands-on aspect of systems development contributes…
Descriptors: Academic Achievement, Case Studies, Computer Assisted Instruction, Computer System Design
van Reijswoud, Victor; Mulo, Emmanuel – E-Learning, 2006
Over recent years the issue of free and open source software (FOSS) for development in less developed countries (LDCs) has received increasing attention. In the beginning the benefits of FOSS for lower developed countries was only stressed by small groups of idealists like Richard Stallman. Now, however, it is moving into the hands of large…
Descriptors: Foreign Countries, International Organizations, Case Studies, Developing Nations

Quinn, Brian – Public & Access Services Quarterly, 1995
Identifies sources of technological stress for public services librarians and patrons and proposes ways to reduce stress, including communicating with staff, implementing a system gradually, providing adequate training, creating proper documentation, planning, considering ergonomics in hardware and software selection, selecting a good interface,…
Descriptors: Communication (Thought Transfer), Computer Anxiety, Computer Interfaces, Computer Selection
Pennock, Lea; Bunt, Rick – EDUCAUSE Quarterly, 2005
Administrative systems renewal is not something the faculty will ever get excited about, but the authors believe there is much that can be done to render the academic community more receptive and even supportive. In this article, the authors use the implementation of their student information system (SIS) at the University of Saskatchewan (and a…
Descriptors: Foreign Countries, Information Systems, Computer System Design, Knowledge Representation
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Previous Page | Next Page ยป
Pages: 1 | 2