NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Miller, Robert E.; Dunn, Paul – Journal of Information Systems Education, 2018
This teaching case describes the functionality of an applicant processing system designed for a fictitious hotel chain. The system detailed in the case includes a webform where applicants complete and submit job applications. The system also includes a desktop application used by hotel managers and Human Resources to track applications and process…
Descriptors: Job Application, Hospitality Occupations, Computer System Design, Online Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wright, M. Keith – Journal of Learning in Higher Education, 2016
There is now a preponderance of evidence suggesting that the types of online course management software (OCMS) used in purely online undergraduate college courses, do not meet the needs of younger immature students. These students often lack the learning skills necessary to succeed in such courses, nor do the popular OCMS include the vigilance…
Descriptors: Online Systems, Electronic Learning, Undergraduate Students, Courseware
Peer reviewed Peer reviewed
Direct linkDirect link
Bahde, Anne – portal: Libraries and the Academy, 2017
This paper explores possibilities for marrying data visualization to online archival finding aids, which have continually suffered from usability issues in their long history. This paper describes a project in which two different data visualization models were built to replace sections of an archival finding aid. Users were then shown the models,…
Descriptors: Visualization, Archives, Data, Usability
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Al-Ammary, Jaflah; Mohammed, Zainab; Omran, Fatima – Turkish Online Journal of Educational Technology - TOJET, 2016
Despite the effectiveness of using e-learning, educational institutions are still facing many challenges with the e-learning infrastructure and technical aspects, practices and capabilities, and improvement in learning outcome. Hence, a need for framework to benchmark the e-learning capability maturity level and measure the extent to what it is…
Descriptors: Foreign Countries, Electronic Learning, Questionnaires, Educational Assessment