Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 7 |
Descriptor
Information Management | 8 |
Information Storage | 8 |
Training | 8 |
Users (Information) | 3 |
Costs | 2 |
Data Analysis | 2 |
Databases | 2 |
Educational Technology | 2 |
Information Security | 2 |
Access to Information | 1 |
Administrator Characteristics | 1 |
More ▼ |
Source
ProQuest LLC | 2 |
Information Systems Education… | 1 |
International Journal of… | 1 |
Journal of Research… | 1 |
National College Access… | 1 |
Performance Improvement… | 1 |
Training | 1 |
Author
Alotaibi, Sara Jeza | 1 |
Bishop, Bradley Wade | 1 |
Ciampa, Mark | 1 |
Collier, Hannah | 1 |
Cook, Kendall E. | 1 |
DeBaun, Bill | 1 |
Miriam Patrick | 1 |
Nobles, Robert | 1 |
Tannan, Ritu | 1 |
Weinstein, Margery | 1 |
Yacci, Michael | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Alotaibi, Sara Jeza – International Journal of Web-Based Learning and Teaching Technologies, 2022
Although there are many education information management systems (EMISs) that currently apply administrative development, they contain limited powers, thus leading to the emergence of problems--the most important and damaging of which being the loss of data quality and ensuring how to verify the validity the education and training information…
Descriptors: Educational Technology, Management Information Systems, Training, Information Management
Bishop, Bradley Wade; Nobles, Robert; Collier, Hannah – Journal of Research Administration, 2021
This paper presents findings from interviews with US Research Integrity Officers (RIOs) on their overall responsibilities as well as perspectives on Data Management Plans (DMPs). DMPs are formal documents describing the roles and activities for managing data during and after research. DMPs are now a required research criterion by many funding…
Descriptors: Ethics, Administrators, Research Administration, Compliance (Psychology)
DeBaun, Bill; Cook, Kendall E. – National College Access Network, 2017
National College Access Network (NCAN) has heard repeatedly and consistently over the years that one of the best aspects of network membership is the ability to collaborate with and learn from other members. In an effort to further the transfer of ideas, in the summer of 2016 NCAN hosted a series of four Idea Incubators across the country, which…
Descriptors: Databases, Information Storage, Data Collection, Student Records
Tannan, Ritu – ProQuest LLC, 2012
One of the objectives of the U.S. government has been the development of a nationwide health information infrastructure, including adoption and use of an electronic health records (EHR) system. However, a 2008 survey conducted by the National Center for Health Statistics indicated a 41.5% usage of the EHR system by physicians in office-based…
Descriptors: Databases, Information Storage, Information Management, Surveys
Weinstein, Margery – Training, 2012
Your learning curriculum needs a new technological platform, but you don't have the expertise or IT equipment to pull it off in-house. The answer is a learning system that exists online, "in the cloud," where learners can access it anywhere, anytime. For trainers, cloud-based coursework often means greater ease of instruction resulting in greater…
Descriptors: Educational Technology, On the Job Training, Electronic Learning, Internet
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
Yacci, Michael – Performance Improvement Quarterly, 1999
Currently there is little knowledge reuse across training, documentation, and performance support. Knowledge-based materials developed for one purpose are not shared or reused in others. The Knowledge Warehouse, a conceptual solution to this problem is discussed. Benefits and limitations are outlined and a definition of a standardized…
Descriptors: Information Management, Information Storage, Instructional Materials, Knowledge Level