Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 13 |
Descriptor
Source
Author
| Al-Werfalli, Daw | 1 |
| Badawood, Ashraf | 1 |
| Denton, Bree | 1 |
| Dicks, Dennis | 1 |
| Edwards, Gregory | 1 |
| Fuller, Nathaniel J. | 1 |
| Green, Lucy Santos | 1 |
| Greenwood, Judy T. | 1 |
| Hadian, Shohreh | 1 |
| Harej, Viktor | 1 |
| Hartman, Robin R. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 7 |
| Reports - Research | 5 |
| Reports - Descriptive | 3 |
| Dissertations/Theses -… | 2 |
| Guides - Non-Classroom | 2 |
| Reports - Evaluative | 2 |
| Speeches/Meeting Papers | 2 |
Education Level
| Higher Education | 6 |
| Postsecondary Education | 2 |
| Adult Education | 1 |
| Elementary Secondary Education | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
National Forum on Education Statistics, 2021
The "Forum Guide to Metadata" presents and examines the ways in which metadata can be used by education agencies to improve data quality and promote a better understanding of education data. Supported by metadata-related case studies from state and local education agencies, the guide highlights the uses of metadata from a technical point…
Descriptors: Metadata, Information Management, Data Collection, Data Use
Hadian, Shohreh; Sly, Nancy – International Association for Development of the Information Society, 2014
Colleges provide professional development opportunities to faculty to promote knowledge growth and improvement of skills. At the college, Scheduled Development (SD) time for faculty is based on the educational practice and recognition of the need for continuous professional development of faculty members. The paper presents a user-centered…
Descriptors: Database Management Systems, Faculty Development, College Faculty, Scheduling
Fuller, Nathaniel J. – ProQuest LLC, 2014
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…
Descriptors: Models, Usability, Database Management Systems, Computer System Design
Badawood, Ashraf; Steenkamp, Annette Lerine; Al-Werfalli, Daw – Information Systems Education Journal, 2013
Blended learning (BL) provides an efficient and effective instructional experience. However, adopting a BL approach poses some challenges to faculty; the most important obstacle found in this research is faculty's lack of knowledge regarding the use of technology in their teaching. This challenge prompted the research project focused on improving…
Descriptors: Faculty Development, Blended Learning, Capacity Building, Teacher Improvement
Mercun, Tanja; Švab, Katarina; Harej, Viktor; Žumer, Maja – Information Research: An International Electronic Journal, 2013
Introduction: To provide valuable services in the future, libraries will need to create better information systems and set up an infrastructure more in line with the current technologies. The "Functional Requirements for Bibliographic Records" conceptual model provides a basis for this transformation, but there are still a number of…
Descriptors: Information Systems, Library Development, Library Services, Bibliographic Databases
Green, Lucy Santos; Inan, Fethi A.; Denton, Bree – Turkish Online Journal of Distance Education, 2012
The purpose of this study was to determine factors that influenced student satisfaction with a new learning management system and to identify which of these factors were most important. The data was collected using an an online survey tool that was administered to students enrolled in courses designed and taught by faculty who participated in a…
Descriptors: Student Attitudes, Technical Assistance, Usability, Group Testing
Hartman, Robin R. – Journal of Web Librarianship, 2012
A small, private academic library took the risk of moving from a traditional integrated library system to adopting a system "in the cloud." This case study presents the setting, history, and local needs of the library, including staffing challenges, and explains the decision-making rationale and process. A description of the library's transition…
Descriptors: Library Administration, Academic Libraries, Library Networks, Case Studies
National Forum on Education Statistics, 2009
The purpose of this guide is to empower people to more effectively use data as information. To accomplish this, the publication explains what metadata are; why metadata are critical to the development of sound education data systems; what components comprise a metadata system; what value metadata bring to data management and use; and how to…
Descriptors: Metadata, Information Utilization, Empowerment, Word Lists
Laaser, Wolfram – Turkish Online Journal of Distance Education, 2011
In the past eLearning has been introduced by many public universities however a concise IT-strategy was not followed during implementation. Different learning platforms were acquired by different departments and no systematic approach was set up to give support for course development, eTutoring or upgrading and archiving of electronic files.…
Descriptors: Management Systems, Universities, Educational Technology, Electronic Learning
Murphey, Rebecca M.; Greenwood, Judy T. – Journal of Access Services, 2009
The Interlibrary Loan department at the University of Mississippi wished to examine interlibrary loan borrowing data dating back to the implementation of the ILLiad system in August 2001 in order to determine why the number of cancellations due to local availability continues to increase. The patron information was extracted in an attempt to…
Descriptors: Academic Libraries, Library Instruction, Feasibility Studies, Library Research
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Early Childhood Data Collaborative (NJ1), 2010
State policymakers are increasingly focused on closing the achievement gap and preparing all students to succeed in school and in life. However, college and career readiness begins long before students enter high school or even a classroom. Differences in children's abilities appear as early as the first year of life, and research has shown that…
Descriptors: Database Management Systems, Systems Building, Systems Development, Data
Dicks, Dennis; Ives, Cindy – Canadian Journal of Learning and Technology, 2008
Instructional design (ID) in its short life has been dominated by behaviourist approaches despite critique focusing on issues of practice as well as theory. Nonetheless, little research has addressed two fundamental questions: "What constitutes good instructional design?" and "How do instructional designers create good design?"…
Descriptors: Instructional Design, Best Practices, Database Management Systems, Interviews

Direct link
Peer reviewed
