Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Database Management Systems | 5 |
| Information Policy | 5 |
| Information Technology | 5 |
| Information Management | 4 |
| Case Studies | 3 |
| Human Factors Engineering | 3 |
| Information Systems | 3 |
| Performance Factors | 3 |
| Computer Security | 2 |
| Database Design | 2 |
| Educational Needs | 2 |
| More ▼ | |
Author
| Akpabio, Akpabio Enebong Ema | 1 |
| Claybaugh, Craig C. | 1 |
| Edwards, Gregory | 1 |
| Middleton, Michael | 1 |
| Murray, Meg Coffin | 1 |
Publication Type
| Dissertations/Theses -… | 3 |
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Adult Education | 3 |
| Higher Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Akpabio, Akpabio Enebong Ema – ProQuest LLC, 2013
Despite huge growth in hospital technology systems, there remains a dearth of literature examining health care administrator's perceptions of the efficacy of interoperable EHR systems. A qualitative research methodology was used in this multiple-case study to investigate the application of diffusion of innovations theory and the technology…
Descriptors: Medical Services, Case Records, Database Management Systems, Adoption (Ideas)
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Claybaugh, Craig C. – ProQuest LLC, 2010
Technology upgrades are an inevitable part of dealing with any man-made invention utilized for productive gain. One key technology used for productive gain within a firm is enterprise software, specifically a firm's Enterprise Resource Planning (ERP) system. After the adoption of an ERP system, an organization is perpetually faced with the…
Descriptors: Computer Software, Program Effectiveness, Environmental Influences, Technological Advancement
Middleton, Michael – Australian Academic & Research Libraries, 2006
An investigation of the development of Australian scientific and technological information (STI) services has been undertaken. It comprises a consideration of the characteristics and development of the services, which is the focus of this part of the paper, along with a broader examination of discipline formation in information management covered…
Descriptors: Information Services, Foreign Countries, Scientific and Technical Information, Information Management

Direct link
Peer reviewed
