Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 17 |
Descriptor
Information Management | 25 |
Performance Technology | 25 |
Computer System Design | 8 |
Database Management Systems | 8 |
Human Factors Engineering | 7 |
Technology Uses in Education | 7 |
Foreign Countries | 5 |
Information Technology | 5 |
Internet | 5 |
Systems Development | 5 |
Higher Education | 4 |
More ▼ |
Source
Author
Fredette, Michelle | 2 |
Battle, Lisa | 1 |
Berdine, William H. | 1 |
Boyce, Darryl K. | 1 |
Bray, Marty | 1 |
Chowdhury, Gobinda G. | 1 |
Cobb, Chris | 1 |
Cohn, Ellen R. | 1 |
Crawford, Margaret, Ed. | 1 |
Degler, Duane | 1 |
Edwards, Gregory | 1 |
More ▼ |
Publication Type
Journal Articles | 21 |
Reports - Descriptive | 14 |
Reports - Research | 6 |
Dissertations/Theses -… | 3 |
Collected Works - Proceedings | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 16 |
Adult Education | 5 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Preschool Education | 1 |
Audience
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to
the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Waters, John K. – Campus Technology, 2013
The latest data alert: By 2020, the amount of data generated daily will reach 40 zettabytes, or roughly 5,247 gigabytes for every person on earth. That's one of the findings in a new report published by IT industry analysts at IDC. The study casts doubt on the ability to capture the value of all this data, especially since schools barely tapped…
Descriptors: Information Management, Data, Data Collection, Data Processing
O'Reilly, Una-May; Veeramachaneni, Kalyan – Research & Practice in Assessment, 2014
Because MOOCs bring big data to the forefront, they confront learning science with technology challenges. We describe an agenda for developing technology that enables MOOC analytics. Such an agenda needs to efficiently address the detailed, low level, high volume nature of MOOC data. It also needs to help exploit the data's capacity to reveal, in…
Descriptors: Data, Technology Uses in Education, Online Courses, Open Education
Boyce, Darryl K. – Facilities Manager, 2012
Although sustainability best practices for buildings are generally well understood, campuses face unique challenges because they are developed to support a diverse community with a variety of facilities. From academic facilities and labs to residences and sports facilities, all operate under one organizational umbrella. This can make it difficult…
Descriptors: Best Practices, Databases, Sustainability, Database Management Systems
Geng, Lihua – Higher Education Studies, 2011
In the process of textbook management of universities, the flow of storage, collection and check of textbook is quite complicated and daily management flow and system also seriously constrains the efficiency of the management process. Thus, in order to combine the information management model and the traditional management model, it is necessary…
Descriptors: Management Information Systems, Information Management, Database Design, Database Management Systems
Feehan, Patrick J. – EDUCAUSE Review, 2013
In 2013, compliance issues march, unceasingly, through every aspect of higher education. Yet the intricacies of privacy, information security, data governance, and IT policy as compliance and risk areas within the IT organization can reverberate and impact every other department within the higher education institution. The primary focus is always…
Descriptors: Higher Education, Information Technology, Compliance (Legal), Risk Management
Fredette, Michelle – Campus Technology, 2011
In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…
Descriptors: Internet, Educational Technology, Information Technology, Performance Technology
Spinuzzi, Clay – Written Communication, 2010
At a search marketing company, each search engine optimization (SEO) specialist writes up to 10 to 12 complex 20-page monthly reports in the first ten business days of each month. These SEO specialists do not consider themselves to be writers, yet they generate these structurally and rhetorically complex reports as a matter of course, while…
Descriptors: Writing (Composition), Work Environment, Competition, Search Engines
Cobb, Chris – Perspectives: Policy and Practice in Higher Education, 2012
Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…
Descriptors: Management Information Systems, Foreign Countries, Computer Interfaces, Technology Uses in Education
Chowdhury, Gobinda G. – Australian Academic & Research Libraries, 2009
Universities in Australia, like their counterparts abroad, are making available several different kinds of electronic information services for their student communities. University students need different types of information for the frequently entwined purposes of learning and living, and such information may be available from a variety of…
Descriptors: Information Needs, Information Systems, Foreign Countries, Information Services
Yahav, Inbal – ProQuest LLC, 2010
In this dissertation we develop a framework that combines data mining, statistics and operations research methods for improving real-time decision support systems in healthcare. Our approach consists of three main concepts: data gathering and preprocessing, modeling, and deployment. We introduce the notion of offline and semi-offline modeling to…
Descriptors: Operations Research, Research Methodology, Identification, Programming
Kesner, Richard M.; Russell, Bruce – Journal of Information Systems Education, 2009
The "FastFit Case Study" and its companion, the "Winter Gear Distributors Case Study" provide undergraduate business students with a suitable and even familiar business context within which to initially consider the role of information management (IM) and to a lesser extent the role of information technology (IT) systems in enabling a business.…
Descriptors: Information Management, Information Technology, Case Studies, Discussion (Teaching Technique)
Tolley, Hilary; Shulruf, Boaz – Computers & Education, 2009
No school is an island; it is a part of a continuum or a pipeline of institutions which together form an educational pipeline through which groups of students pass. To turn a body of data into useful information for knowledge-based decision-making at any level, data must be collected, organised, analysed and reflected upon. The purpose of this…
Descriptors: Educational Quality, Database Management Systems, Information Management, Management Information Systems
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government
Previous Page | Next Page ยป
Pages: 1 | 2