NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vesper, James L.; Kartoglu, Ümit; Herrington, Jan; Reeves, Thomas C. – British Journal of Educational Technology, 2016
This paper describes the use of two different risk assessment strategies during the design and development of a complex authentic task-based e-learning program developed by the World Health Organization (WHO). The first strategy involved the use of expert reviewers and the second strategy employed the engagement of a risk assessment expert…
Descriptors: Formative Evaluation, Electronic Learning, Risk Assessment, Expertise
Zeng, Yajun – ProQuest LLC, 2010
Enterprise Resource Planning (ERP) systems have been regarded as one of the most important information technology developments in the past decades. While ERP systems provide the potential to bring substantial benefits, their implementations are characterized with large capital outlay, long duration, and high risks of failure including…
Descriptors: Expenditures, Research Methodology, Risk Management, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy