NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christine Ladwig; Dana Schwieger – Information Systems Education Journal, 2024
Hollywood screenwriters worry about Artificial Intelligence (AI) replacements taking over their jobs. Famous museums litigate to protect their art from AI infringement. A major retailer scraps a machine-learning based recruitment program that was biased against women. These are just a few examples of how AI is affecting the world of work,…
Descriptors: Computer Science Education, Curriculum Development, Information Systems, Information Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Neidigh, Robert O.; Langella, Ian M. – Journal of Education for Business, 2020
The fictitious online retailer "Elbe" faces a deterministic demand for products over a geographic area and fulfills this demand using supply nodes and fulfillment centers. Experiential learning using provided solver and ILOG models (available upon request from the authors) for this supply chain allows students to experiment with…
Descriptors: Supply and Demand, Internet, Retailing, Mathematical Applications
Peer reviewed Peer reviewed
Direct linkDirect link
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology