Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Contemporary Issues in… | 1 |
Educational Technology &… | 1 |
Information Systems Education… | 1 |
Journal of Access Services | 1 |
Journal of Research… | 1 |
ProQuest LLC | 1 |
Author
Abel, Marie-Helene | 1 |
Barry, Catherine | 1 |
Benayache, Ahcene | 1 |
Bishop, Bradley Wade | 1 |
Chaput, Brigitte | 1 |
Ciampa, Mark | 1 |
Collier, Hannah | 1 |
Farmer, Tadd | 1 |
James Edwin Tippey Jr. | 1 |
Lenne, Dominique | 1 |
Moulin, Claude | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bishop, Bradley Wade; Nobles, Robert; Collier, Hannah – Journal of Research Administration, 2021
This paper presents findings from interviews with US Research Integrity Officers (RIOs) on their overall responsibilities as well as perspectives on Data Management Plans (DMPs). DMPs are formal documents describing the roles and activities for managing data during and after research. DMPs are now a required research criterion by many funding…
Descriptors: Ethics, Administrators, Research Administration, Compliance (Psychology)
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Randall, Daniel L.; Farmer, Tadd; West, Richard E. – Contemporary Issues in Technology and Teacher Education (CITE Journal), 2019
This article describes an examination of how undergraduate instructional design assistants (IDAs) scaled up an open badge system by assisting in creating open badges. External reviewers rated the open badge rubrics created by seven of these IDAs along with those created by instructors, and the results were compared by scored components as well as…
Descriptors: Undergraduate Students, Teaching Assistants, Instructional Design, Teacher Education
Smith, Fred W. – Journal of Access Services, 2010
An automated retrieval system, adapted from a commercial warehouse application, has been installed at Georgia Southern University and has been well accepted by patrons and library personnel due to its reliability, efficiency, cost-effectiveness, and responsiveness. (Contains 1 figure.)
Descriptors: Academic Libraries, Books, Storage, Library Facilities
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
Abel, Marie-Helene; Benayache, Ahcene; Lenne, Dominique; Moulin, Claude; Barry, Catherine; Chaput, Brigitte – Educational Technology & Society, 2004
E-learning leads to evolutions in the way of designing a course. Diffused through the web, the course content cannot be the direct transcription of a face to face course content. A course can be seen as an organization in which different actors are involved. These actors produce documents, information and knowledge that they often share. We…
Descriptors: Course Content, Internet, College Instruction, Models