Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 19 |
Descriptor
Source
EDUCAUSE Quarterly | 33 |
Author
DeBlois, Peter B. | 2 |
Albright, Michael J. | 1 |
Arseniev, Marina | 1 |
Askren, Mark | 1 |
Barry, Jim | 1 |
Bennett, Cedric | 1 |
Buchner, Marc | 1 |
Butler, LeRoy | 1 |
Carroll, Timothy D. | 1 |
Chester, Timothy M. | 1 |
Efaw, Jamie | 1 |
More ▼ |
Publication Type
Journal Articles | 33 |
Reports - Descriptive | 28 |
Reports - Research | 3 |
Reports - Evaluative | 2 |
Education Level
Higher Education | 33 |
Postsecondary Education | 21 |
Two Year Colleges | 1 |
Audience
Teachers | 1 |
Location
California | 3 |
Indiana | 2 |
New York | 2 |
Ohio | 2 |
Washington | 2 |
Massachusetts | 1 |
Minnesota | 1 |
New Jersey | 1 |
Tennessee | 1 |
United Kingdom (England) | 1 |
Utah | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Chester, Timothy M. – EDUCAUSE Quarterly, 2006
Shortly after becoming a CIO (Chief Information Officer), the author read an article by Gregory Jackson in the January 2004 Chronicle of Higher Education entitled, "A CIO's Question: Will You Still Need Me When I'm 64?" Jackson, one of the most widely known and respected CIOs in higher education, argued that CIOs in higher education face four…
Descriptors: Higher Education, Information Technology, Technology Planning, Technology Uses in Education
Gustafson, Kimberly K.; Kors, Kurt – EDUCAUSE Quarterly, 2004
Universities face the challenge of being aware of and responsive to continuous, rapid technological change as it affects the institutional mission. To address this challenge, the University of Washington conducted an institution-wide assessment of educational technology. The purpose of this research was to inform the design of technical tools and…
Descriptors: Educational Technology, Technology Planning, Strategic Planning, Program Evaluation
Forsstrom, Jan; Ham, Gary – EDUCAUSE Quarterly, 2007
Five years ago, North Shore Community College (NSCC) encountered rising enrollments in the face of lagging state funding. The addition of two new campuses stretched NSCC thin as it attempted to provide administrative and academic services across five (more recently consolidated to four) locations. Its students increasingly struggled to balance the…
Descriptors: Community Colleges, Multicampus Colleges, Information Technology, Web Sites
Askren, Mark; Arseniev, Marina – EDUCAUSE Quarterly, 2004
With a new wave of campus IT solutions comes a familiar challenge: How does one encourage and help build distributed applications without being overrun by stovepipe solutions? Anticipating significant enrollment growth (5 percent per year) for the next several years, double-digit annual growth in funded research, and little chance that resources…
Descriptors: Higher Education, Information Technology, Management Systems, College Administration
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Powel, Wayne D.; Barry, Jim – EDUCAUSE Quarterly, 2005
In 1995, Gonzaga University embarked on a project to implement a university-wide information system. The search for an "out-of-the-box" solution began following an attempt to build an integrated data management system in-house. In 1994, Gonzaga decided to look at commercial solutions to its database management problems. With the blessing…
Descriptors: Computer Software, Information Systems, Databases, Guidelines
McCardle, Ken – EDUCAUSE Quarterly, 2005
As a CIO leading an IT department through change and reorganization, the author developed the Enterprise Compass--a four-point guide to reaching goals and focusing achievement. The Enterprise Compass directs staff to look forward to future accomplishment, back for performance assessments, across campus for better understanding of practical working…
Descriptors: Technology Planning, Information Technology, Guidelines, Program Implementation
Spicer, Donald Z.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2004
This year marks the fifth annual EDUCAUSE Current Issues Survey to identify what campus information technology leaders see as their most critical IT challenges. Thirty-five percent (571) of the 1,638 EDUCAUSE primary member representatives who were asked to participate responded to an e-mail invitation to complete the Web-based survey in December…
Descriptors: Information Technology, Human Resources, Leadership, Higher Education
Strong, Bart; Kidney, David – EDUCAUSE Quarterly, 2004
For several years prior to 2000, students and faculty at McMaster University rated classrooms below those at peer universities. In the case of many classrooms, the teaching environments were outdated and the technology was old. The provost determined in 2000 that they needed to make a long-term investment in their learning spaces. For sound…
Descriptors: Strategic Planning, Technology Planning, Classroom Design, Technology Uses in Education
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Zhang, Guo-Qiang; White, Lee; Hesse, Christopher; Buchner, Marc; Mehregany, Mehran – EDUCAUSE Quarterly, 2005
Virtually every academic department in an institute of higher education requires Web presence as a critical component of its information technology strategy. The problem of how to leverage the World Wide Web and build effective and useful departmental Web sites seems to have long been solved. Yet browsing academic Web sites from around the world…
Descriptors: Design, Cost Effectiveness, Engineering Education, Computer Software
DeBlois, Peter B. – EDUCAUSE Quarterly, 2005
Just as technology-enhanced teaching and learning has evolved over the past 50 or so years--from overhead projectors and reading machines to PowerPoint presentations, discipline-specific simulations, and Web-based databases--so has support for instructional technology evolved at institutions. The changing rubric of librarian, media specialist,…
Descriptors: Educational Technology, Leadership, Interviews, Instructional Leadership
Efaw, Jamie – EDUCAUSE Quarterly, 2005
With the infusion of technology into all aspects of daily life, students are becoming more and more adept at using technology as an educational resource. Many faculty, however, are not keeping pace with their students. Additionally, faculty feel increasingly unprepared to integrate technology into the classroom. Many institutions of higher learner…
Descriptors: Educational Technology, Faculty Development, Educational Resources, Teaching Methods
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy