Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer System Design | 5 |
| Database Management Systems | 5 |
| Needs Assessment | 5 |
| Design Requirements | 2 |
| Federal Government | 2 |
| Information Systems | 2 |
| Strategic Planning | 2 |
| Administrator Guides | 1 |
| Best Practices | 1 |
| Business Administration | 1 |
| Change Strategies | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 2 |
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
| Guides - Non-Classroom | 1 |
| Reports - Evaluative | 1 |
Education Level
| Adult Education | 1 |
| Higher Education | 1 |
Audience
Location
| Turkey | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fuller, Nathaniel J. – ProQuest LLC, 2014
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…
Descriptors: Models, Usability, Database Management Systems, Computer System Design
Laaser, Wolfram – Turkish Online Journal of Distance Education, 2011
In the past eLearning has been introduced by many public universities however a concise IT-strategy was not followed during implementation. Different learning platforms were acquired by different departments and no systematic approach was set up to give support for course development, eTutoring or upgrading and archiving of electronic files.…
Descriptors: Management Systems, Universities, Educational Technology, Electronic Learning
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Duffin, Ken – Information Management & Technology, 1996
Designing, developing, and implementing an electronic document management system involves preparation. Areas to consider when facilitating technological change include staff input and business and customer needs and wants. Further discussion addresses value assessment of document type, providing a pilot system for staff experiment and practice,…
Descriptors: Administrator Guides, Computer System Design, Database Management Systems, Electronic Text
Naden, Dave – 1989
This feasibility study of the computer system of the Department of Education's Office of Impact Aid (OIA) was conducted to (1) assess the capabilities, as well as the drawbacks, of the current system and the other components of OIA's data processing activities; and (2) explore alternative computer systems, based on available technology and current…
Descriptors: Comparative Analysis, Computer System Design, Data Processing, Database Management Systems

Direct link
Peer reviewed
