Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 6 |
| Since 2017 (last 10 years) | 11 |
| Since 2007 (last 20 years) | 87 |
Descriptor
Source
Author
| Dillon, Andrew | 4 |
| Budzik, Jay | 3 |
| Hammond, Kristian | 3 |
| Allen, Bryce | 2 |
| Allen, Bryce L. | 2 |
| Belkin, Nicholas J. | 2 |
| Chen, Hsinchun | 2 |
| Cummings, Jeffrey | 2 |
| Feldman, Susan | 2 |
| Frick, Theodore W. | 2 |
| Harvey, Francis A. | 2 |
| More ▼ | |
Publication Type
Education Level
| Higher Education | 62 |
| Postsecondary Education | 36 |
| Adult Education | 5 |
| Elementary Secondary Education | 5 |
| Secondary Education | 1 |
Location
| United Kingdom | 8 |
| Pennsylvania | 4 |
| Canada | 3 |
| Austria | 2 |
| Germany | 2 |
| Greece | 2 |
| Minnesota | 2 |
| Netherlands | 2 |
| New York | 2 |
| New Zealand | 2 |
| United States | 2 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
Pennock, Lea; Bunt, Rick – EDUCAUSE Quarterly, 2005
Administrative systems renewal is not something the faculty will ever get excited about, but the authors believe there is much that can be done to render the academic community more receptive and even supportive. In this article, the authors use the implementation of their student information system (SIS) at the University of Saskatchewan (and a…
Descriptors: Foreign Countries, Information Systems, Computer System Design, Knowledge Representation
Senapathi, Mali – Journal of Information Technology Education, 2005
The aim of the research is to derive a framework for the evaluation of Computer Aided Software Engineering (CASE) tool learnability in educational environments. Drawing from the literature of Human Computer Interaction and educational research, a framework for evaluating CASE tool learnability in educational environments is derived. The two main…
Descriptors: Evaluation Criteria, Evaluation Methods, Case Studies, Educational Environment
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design
Zhang, Ping – 1997
A graduate distance course on Information Systems Analysis and Design was designed and delivered under the guidance of the following four philosophies: (1) an effective education is a learner-centered education; (2) distance students are more likely to experience situated learning and problem-based learning; (3) enforced learning should enable…
Descriptors: Academic Achievement, Computer Assisted Instruction, Computer Mediated Communication, Computer System Design
Batt, Rosemary; Christopherson, Susan; Rightor, Ned; Van Jaarsveld, Danielle – 2001
A study was made of the labor market issues facing professionals and employers in the new media industry, an industry that combines elements of computing technology, telecommunications, and content to create products and services that can be used interactively by consumers and business owners. The study was carried out through a Web-based survey…
Descriptors: Adults, College Graduates, Computer Assisted Design, Computer Graphics

Peer reviewed
Direct link
