NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bishop, Bradley Wade; Nobles, Robert; Collier, Hannah – Journal of Research Administration, 2021
This paper presents findings from interviews with US Research Integrity Officers (RIOs) on their overall responsibilities as well as perspectives on Data Management Plans (DMPs). DMPs are formal documents describing the roles and activities for managing data during and after research. DMPs are now a required research criterion by many funding…
Descriptors: Ethics, Administrators, Research Administration, Compliance (Psychology)
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Randall, Daniel L.; Farmer, Tadd; West, Richard E. – Contemporary Issues in Technology and Teacher Education (CITE Journal), 2019
This article describes an examination of how undergraduate instructional design assistants (IDAs) scaled up an open badge system by assisting in creating open badges. External reviewers rated the open badge rubrics created by seven of these IDAs along with those created by instructors, and the results were compared by scored components as well as…
Descriptors: Undergraduate Students, Teaching Assistants, Instructional Design, Teacher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Fred W. – Journal of Access Services, 2010
An automated retrieval system, adapted from a commercial warehouse application, has been installed at Georgia Southern University and has been well accepted by patrons and library personnel due to its reliability, efficiency, cost-effectiveness, and responsiveness. (Contains 1 figure.)
Descriptors: Academic Libraries, Books, Storage, Library Facilities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
Peer reviewed Peer reviewed
Direct linkDirect link
Abel, Marie-Helene; Benayache, Ahcene; Lenne, Dominique; Moulin, Claude; Barry, Catherine; Chaput, Brigitte – Educational Technology & Society, 2004
E-learning leads to evolutions in the way of designing a course. Diffused through the web, the course content cannot be the direct transcription of a face to face course content. A course can be seen as an organization in which different actors are involved. These actors produce documents, information and knowledge that they often share. We…
Descriptors: Course Content, Internet, College Instruction, Models