NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Miller, Robert E.; Dunn, Paul – Journal of Information Systems Education, 2018
This teaching case describes the functionality of an applicant processing system designed for a fictitious hotel chain. The system detailed in the case includes a webform where applicants complete and submit job applications. The system also includes a desktop application used by hotel managers and Human Resources to track applications and process…
Descriptors: Job Application, Hospitality Occupations, Computer System Design, Online Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Bahde, Anne – portal: Libraries and the Academy, 2017
This paper explores possibilities for marrying data visualization to online archival finding aids, which have continually suffered from usability issues in their long history. This paper describes a project in which two different data visualization models were built to replace sections of an archival finding aid. Users were then shown the models,…
Descriptors: Visualization, Archives, Data, Usability
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors