Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Human Factors Engineering | 6 |
Information Technology | 6 |
Technology Uses in Education | 6 |
Higher Education | 4 |
Information Transfer | 3 |
Performance Technology | 3 |
Technology Integration | 3 |
Technology Planning | 3 |
Barriers | 2 |
Change Strategies | 2 |
Information Management | 2 |
More ▼ |
Source
Campus Technology | 2 |
EDUCAUSE Quarterly | 1 |
EDUCAUSE Review | 1 |
Educational Technology | 1 |
International Journal of… | 1 |
Author
Attuquayefio, Samuel NiiBoi | 1 |
Chester, Timothy M. | 1 |
Fredette, Michelle | 1 |
Jackson, Gregory A. | 1 |
Lahiri, Minakshi | 1 |
Moseley, James L. | 1 |
Villano, Matt | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Information Analyses | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 1 |
Audience
Location
Ghana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Attuquayefio, Samuel NiiBoi – International Journal of Virtual and Personal Learning Environments, 2022
The purpose of this study is to investigate students' intention to use ICT and use behaviour for learning and research by extending the UTAUT model with Health Issues and satisfaction as mediating variables between ergonomics factors and intention to use ICT relationship. This study employed a survey, which used a questionnaire to elicit data from…
Descriptors: Information Technology, Technology Integration, Higher Education, Technology Uses in Education
Lahiri, Minakshi; Moseley, James L. – Educational Technology, 2013
"Cloud computing" is currently the "buzzword" in the Information Technology field. Cloud computing facilitates convenient access to information and software resources as well as easy storage and sharing of files and data, without the end users being aware of the details of the computing technology behind the process. This…
Descriptors: Technology Uses in Education, Technology Planning, Information Technology, Information Management
Fredette, Michelle – Campus Technology, 2011
In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…
Descriptors: Internet, Educational Technology, Information Technology, Performance Technology
Jackson, Gregory A. – EDUCAUSE Review, 2007
For most of the past decade, IT leaders in higher education felt on top of things. Challenges were usually comprehensible and addressable, doing reasonable things yielded reasonable results, and for the most part, IT was a substantial contributor to institutional progress. But these days, IT leaders rarely feel on top of things. Instead, some days…
Descriptors: Higher Education, Coping, Information Technology, Technology Integration
Chester, Timothy M. – EDUCAUSE Quarterly, 2006
Shortly after becoming a CIO (Chief Information Officer), the author read an article by Gregory Jackson in the January 2004 Chronicle of Higher Education entitled, "A CIO's Question: Will You Still Need Me When I'm 64?" Jackson, one of the most widely known and respected CIOs in higher education, argued that CIOs in higher education face four…
Descriptors: Higher Education, Information Technology, Technology Planning, Technology Uses in Education
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering