Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Information Technology | 4 |
Program Implementation | 4 |
Risk | 4 |
Risk Management | 4 |
College Administration | 2 |
Compliance (Legal) | 2 |
Computer Security | 2 |
Information Systems | 2 |
Technology Planning | 2 |
Access to Information | 1 |
Administrator Responsibility | 1 |
More ▼ |
Author
Gray, Terry | 1 |
Herrington, Jan | 1 |
Kartoglu, Ümit | 1 |
Qayoumi, Mohammad H. | 1 |
Reeves, Thomas C. | 1 |
Vesper, James L. | 1 |
Woody, Carol | 1 |
Zeng, Yajun | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vesper, James L.; Kartoglu, Ümit; Herrington, Jan; Reeves, Thomas C. – British Journal of Educational Technology, 2016
This paper describes the use of two different risk assessment strategies during the design and development of a complex authentic task-based e-learning program developed by the World Health Organization (WHO). The first strategy involved the use of expert reviewers and the second strategy employed the engagement of a risk assessment expert…
Descriptors: Formative Evaluation, Electronic Learning, Risk Assessment, Expertise
Zeng, Yajun – ProQuest LLC, 2010
Enterprise Resource Planning (ERP) systems have been regarded as one of the most important information technology developments in the past decades. While ERP systems provide the potential to bring substantial benefits, their implementations are characterized with large capital outlay, long duration, and high risks of failure including…
Descriptors: Expenditures, Research Methodology, Risk Management, Risk
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy