Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Computer Security | 10 |
| Information Technology | 10 |
| Technical Support | 10 |
| Computer Software | 4 |
| Computer Uses in Education | 4 |
| Educational Technology | 4 |
| Computer Networks | 3 |
| Computer Oriented Programs | 3 |
| Distance Education | 3 |
| Electronic Learning | 3 |
| Higher Education | 3 |
| More ▼ | |
Source
| Association Supporting… | 2 |
| ProQuest LLC | 2 |
| Campus Technology | 1 |
| EDUCAUSE | 1 |
| EDUCAUSE Quarterly | 1 |
| International Journal of… | 1 |
| Journal of Educational… | 1 |
| Journal of Information… | 1 |
Author
Publication Type
| Journal Articles | 5 |
| Reports - Research | 3 |
| Collected Works - Proceedings | 2 |
| Dissertations/Theses -… | 2 |
| Reports - Descriptive | 2 |
| Reports - Evaluative | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 7 |
| Postsecondary Education | 5 |
| Adult Education | 1 |
| Elementary Secondary Education | 1 |
| Two Year Colleges | 1 |
Location
| California | 2 |
| Alaska | 1 |
| China | 1 |
| Macau | 1 |
| Massachusetts | 1 |
| Michigan | 1 |
| Missouri | 1 |
| New York | 1 |
| Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Brooks, D. Christopher; Pomerantz, Jeffrey – EDUCAUSE, 2017
For the fourteenth year, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology and higher education's most important end users, undergraduate students. For the 2017 report, 43,559 students from 124 institutions in 10 countries and 40 U.S. states participated in the research. The quantitative findings…
Descriptors: Undergraduate Students, Information Technology, Technology Uses in Education, Use Studies
Skallos, Maryly K. – ProQuest LLC, 2014
With funding cuts, reduced enrollments, and meeting a presidential initiative, Michigan community colleges need to find ways in which they can continue to provide quality education at an affordable price. Consumerization of information technology (IT) has been proposed to meet the technological needs of the community college. There is little…
Descriptors: Community Colleges, Qualitative Research, Information Technology, Administrators
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Harris, Mark A. – ProQuest LLC, 2010
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
Descriptors: Computer Security, Job Training, Video Technology, Technical Support
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software

Peer reviewed
Direct link
