Descriptor
| Computer Security | 2 |
| Information Technology | 2 |
| Technical Support | 2 |
| Administration | 1 |
| Administrators | 1 |
| Audits (Verification) | 1 |
| Automation | 1 |
| Benchmarking | 1 |
| Best Practices | 1 |
| Centralization | 1 |
| Client Server Architecture | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
Location
| California | 2 |
| Alaska | 1 |
| Massachusetts | 1 |
| Missouri | 1 |
| New York | 1 |
| Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software

Peer reviewed
Direct link
