Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Author
Bennett, Cedric | 1 |
Daniel, Ben | 1 |
Hacker, Thomas J. | 1 |
Villano, Matt | 1 |
Weiss, Meredith | 1 |
Wheeler, Bradley C. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Audience
Location
Indiana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Daniel, Ben – Educational Technology, 2017
The increasing availability of digital data in higher education provides an extraordinary resource for researchers to undertake educational research, targeted at understanding challenges facing the sector. Big data can stimulate new ways to transform processes relating to learning and teaching, and helps identify useful data, sources of evidence…
Descriptors: Higher Education, Educational Research, Information Utilization, Data
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Weiss, Meredith – EDUCAUSE Quarterly, 2008
Interaction design is a user-centered approach to development in which users and their goals are the driving force behind a project's design. Interaction design principles are fundamental to the design and implementation of effective websites, but they are not sufficient. This article argues that, to reach its full potential, a website should also…
Descriptors: Computer Software, Marketing, Interaction, Web Sites
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration