Descriptor
Source
| College and University | 5 |
Author
| Hurley, Douglas E. | 1 |
| Lonabocker, Louise | 1 |
| Rugg, Edwin A. | 1 |
| Seaman, A. Frederick, Jr. | 1 |
| Siblock, Steve | 1 |
Publication Type
| Guides - Non-Classroom | 5 |
| Journal Articles | 5 |
| Opinion Papers | 2 |
| Reports - Evaluative | 1 |
Education Level
Audience
| Practitioners | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedSeaman, A. Frederick, Jr. – College and University, 1979
Information systems are becoming more than computer systems, with new equipment and techniques combining with data processing to form a new field called information technology. The emerging discipline of systems engineering is discussed along with nine systems engineering techniques. An organization chart of an information services department is…
Descriptors: Accountability, Computers, Data Processing, Data Processing Occupations
Peer reviewedLonabocker, Louise – College and University, 1990
Distributed computer processing, increasingly common on campuses, brings the convenience of open and broad access to information but must be combined with well-planned and regularly reviewed security measures. Ethical codes must be defined and followed, and a combination of security components required to gain access should be used when possible.…
Descriptors: Access to Information, Codes of Ethics, Confidential Records, Data Processing
Peer reviewedHurley, Douglas E. – College and University, 1981
A procedure called "Services/Requirements Analysis" is proposed as a means of improving input to institutional management information systems. The procedure profiles the office's information needs and limitations and identifies benefit groups, all according to user perceptions and not the assumptions of the technological community. (MSE)
Descriptors: Data Collection, Enrollment, Higher Education, Man Machine Systems
Peer reviewedRugg, Edwin A. – College and University, 1983
Issues and considerations likely to be confronted in designing and constructing longitudinal institutional databases or studies are examined, including operational definitions of retention and attrition. The intent is to reduce current limitations in dropout research. (MSE)
Descriptors: Data Collection, Databases, Dropout Research, Higher Education
Peer reviewedSiblock, Steve – College and University, 1997
A student information system, repository of most essential customer information and registration data, is especially vulnerable to data corruption because of its many different users. A hypothetical case illustrates how service to a college applicant can be compromised by inattention in system use. Specific areas of system vulnerability are noted,…
Descriptors: College Administration, College Applicants, Confidential Records, Data Processing


