Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Identification | 4 |
| Models | 4 |
| Higher Education | 2 |
| Information Systems | 2 |
| Information Technology | 2 |
| Access to Computers | 1 |
| Action Research | 1 |
| Behavior Theories | 1 |
| Case Studies | 1 |
| Child Welfare | 1 |
| College Administration | 1 |
| More ▼ | |
Author
| Durand, Emily G. | 1 |
| Morales, Jocelyn | 1 |
| Rine, Christine M. | 1 |
| San Nicolas-Rocca, Tonia | 1 |
| Schroeder, Kurt A. | 1 |
| Vanyukevych, Anastasiya B. | 1 |
| Wong, Wilson | 1 |
Publication Type
| Dissertations/Theses -… | 2 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 1 |
Audience
| Administrators | 1 |
| Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rine, Christine M.; Morales, Jocelyn; Vanyukevych, Anastasiya B.; Durand, Emily G.; Schroeder, Kurt A. – Journal of Family Social Work, 2012
Geographic Information Systems (GIS) have become widely used outside of traditional mapping applications, expanding their reach to social service organizations. The purpose of this article is to describe and explore the benefits of GIS mapping in identifying strengths and needs of foster care systems in rural settings through graphically assessing…
Descriptors: Stakeholders, Child Welfare, Foster Care, Geographic Information Systems
Wong, Wilson – ProQuest LLC, 2013
User resistance has been identified as a factor in information systems implementation failures in the health care industry. RFID, radio frequency identification, is being incorporated into new health care information systems in order to effect cost reductions by tracking, identifying and monitoring individuals and medical items. This is the first…
Descriptors: Trust (Psychology), Information Systems, Health Services, Resistance (Psychology)
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
CAUSE, Boulder, CO. – 1991
Seven papers from the 1990 CAUSE conference's Track IV, Policy and Standards are presented. Topics addressed in this track include data administration, computing access, involvement of constituencies in policy making and enforcement, and institutional standards for departmental systems. Papers and their authors are as follows: "Evolution of a…
Descriptors: Case Studies, College Administration, Computer Networks, Documentation

Peer reviewed
Direct link
