NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Heinen, Richard; Kerres, Michael; Scharnberg, Gianna; Blees, Ingo; Rittberger, Marc – Journal of Interactive Media in Education, 2016
The paper describes the concept of a federated ecosystem for Open Educational Resources (OER) in the German education system. Here, a variety of OER repositories (ROER) (Muuß-Merholz & Schaumburg, 2014) and reference platforms have been established in the recent past. In order to develop this ecosystem, not only are metadata standards…
Descriptors: Reference Services, Educational Resources, Open Source Technology, Metadata
Privacy Technical Assistance Center, 2017
Educational authorities and policymakers are increasingly focused on protecting student privacy while using data to inform program and policy decisions. Data from more than one government agency is often analyzed to more holistically inform these decisions. This has led to the development of integrated data systems (IDSs) that allow linkage of…
Descriptors: Privacy, Information Systems, Database Management Systems, Program Evaluation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Claybaugh, Craig C. – ProQuest LLC, 2010
Technology upgrades are an inevitable part of dealing with any man-made invention utilized for productive gain. One key technology used for productive gain within a firm is enterprise software, specifically a firm's Enterprise Resource Planning (ERP) system. After the adoption of an ERP system, an organization is perpetually faced with the…
Descriptors: Computer Software, Program Effectiveness, Environmental Influences, Technological Advancement
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government