NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Stewart, Henry M. – CAUSE/EFFECT, 1995
The University of Rochester's experience with online analytical processing (OLAP), part of its executive information system, is reported. The server, a multiuser, local area network (LAN)-based database loaded from legacy systems or a data warehouse, can rapidly manipulate and display data, and allows quick creation and changing of analytical…
Descriptors: College Administration, Data Processing, Databases, Decision Making
Peer reviewed Peer reviewed
Benbasat, Izak; And Others – Computers and Education, 1982
Describes a computer-assisted testing system which produces multiple-choice examinations for a college course in business administration. The system uses SPIRES (Stanford Public Information REtrieval System) to manage a database of questions and related data, mark-sense cards for machine grading tests, and ACL (6) (Audit Command Language) to…
Descriptors: Computer Assisted Testing, Data Processing, Databases, Higher Education