Descriptor
Source
| EDUCAUSE Quarterly | 4 |
Author
| Barry, Jim | 1 |
| Bunt, Rick | 1 |
| Pennock, Lea | 1 |
| Powel, Wayne D. | 1 |
| Qayoumi, Mohammad H. | 1 |
| Whitehouse, Kendall | 1 |
| Woody, Carol | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 2 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 3 |
Audience
Location
| Canada | 1 |
| Pennsylvania | 1 |
| Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
Whitehouse, Kendall – EDUCAUSE Quarterly, 2006
Most large enterprises now have some type of portal to organize their internal information services. Few, however, have the long history of the SPIKE project at the University of Pennsylvania's Wharton School. Originally developed during the 1994-1995 school year, SPIKE was an intranet information portal before the term "information…
Descriptors: Feedback (Response), Information Systems, Internet, Information Services
Pennock, Lea; Bunt, Rick – EDUCAUSE Quarterly, 2005
Administrative systems renewal is not something the faculty will ever get excited about, but the authors believe there is much that can be done to render the academic community more receptive and even supportive. In this article, the authors use the implementation of their student information system (SIS) at the University of Saskatchewan (and a…
Descriptors: Foreign Countries, Information Systems, Computer System Design, Knowledge Representation
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy

Peer reviewed
Direct link
