NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 316 to 330 of 1,264 results Save | Export
Burgess, J. T. F. – Computers in Libraries, 2010
This article proceeds from the position that obsession with technology is a distraction from librarians' true mission and explores how a constellation of emerging information technologies might empower librarians to reconsider their commitment to the technological treadmill and instead turn to a more humanistic orientation. This article presents…
Descriptors: Semantics, Information Technology, Educational Technology, Librarians
Peer reviewed Peer reviewed
Direct linkDirect link
Mueller, Daniel; Strohmeier, Stefan – International Journal of Training and Development, 2010
Virtual learning environments (VLE) constitute the current information systems' (IS) category for electronically supported corporate training and development. Frequently supposed advantages of using VLE refer, for instance, to the efficiency, individuality, ubiquity, timeliness and task orientation of learning. However, a crucial precondition of…
Descriptors: Industrial Training, Information Systems, Virtual Classrooms, Expertise
Peer reviewed Peer reviewed
Direct linkDirect link
Yeh, C. Rosa; Tao, Yu-Hui – Australasian Journal of Educational Technology, 2012
The use of personal response systems (PRS) in classrooms is gaining popularity in the higher education institutes of Taiwan. However, past research rarely adopts theories from the information system domains, and their focus was primarily on the UK and US context. Therefore, this study adopted a theory-based approach to explore the perceptions of…
Descriptors: Foreign Countries, Information Systems, College Students, Theories
Peer reviewed Peer reviewed
Direct linkDirect link
Ayyagari, Ramakrishna; Tyks, Jonathan – Journal of Information Technology Education: Innovations in Practice, 2012
Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…
Descriptors: Information Technology, Information Systems, Core Curriculum, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Chawla, Deepak; Joshi, Himanshu – Campus-Wide Information Systems, 2012
Purpose: E-learning is emerging as a potential delivery medium for education and training. This is evident from the increasing number of educational institutions and organizations adopting e-learning. In India, there has been an upsurge in the number of students going for management education. But, before management institutes embark on this…
Descriptors: Factor Analysis, Familiarity, Administrator Education, Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – Journal of Education for Business, 2011
One vision of education evolution is to change the modes of thinking of students. Critical thinking, design thinking, and system thinking are higher order thinking paradigms that are specifically pertinent to business education. A model-directed approach to teaching and learning higher order thinking is proposed. An example of application of the…
Descriptors: Management Information Systems, Business Education, Teaching Methods, Thinking Skills
Jacobs, James Jay – ProQuest LLC, 2009
Data compression is the art of using encoding techniques to represent data symbols using less storage space compared to the original data representation. The encoding process builds a relationship between the entropy of the data and the certainty of the system. The theoretical limits of this relationship are defined by the theory of entropy in…
Descriptors: Information Systems, Scientific Concepts, Data, Coding
Jamalallail, Faisal Mohammed – ProQuest LLC, 2012
Jeddah public health resources are struggling to meet the demand of the large populations. The city is suffering from insufficient public health resources along with other health problem, like high rates of some disease, which resulted in an amount of dissatisfaction among some of the health facilities visitors. The absence of a comprehensive…
Descriptors: Foreign Countries, Public Health, Health Services, Diseases
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Kate – Library Quarterly, 2012
The informatics moment is the moment when a person seeks help in using some digital technology that is new to him or her. This article examines the informatics moment in people's everyday lives as they sought help at a branch public library. Four types of literacy were involved: basic literacy (reading and writing), computer literacy (use of a…
Descriptors: Library Services, Access to Computers, Disadvantaged, Social Capital
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Ashrafi, Noushin; Kuilboer, Jean-Pierre; Joshi, Chaitanya; Ran, Iris; Pande, Priyanka – Journal of Information Systems Education, 2014
The explosive advances in information technology combined with the current climate for health care reform have intensified the need for skilled individuals who can develop, understand, and manage medical information systems in organizations. Health Informatics facilitates quality care at a reasonable cost by allowing access to the right data by…
Descriptors: Health Services, Information Technology, Information Systems, Medical Evaluation
Harris, Mark A. – ProQuest LLC, 2010
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
Descriptors: Computer Security, Job Training, Video Technology, Technical Support
Zainudin, Fadzliaton; Ismail, Kamarulzaman – International Association of School Librarianship, 2010
The Ministry of Education has come up with an innovative way to monitor the progress of 9,843 School Resource Centers (SRCs) using an online management information system called iQ-PSS (Quality Index of SRC). This paper aims to describe the data collection method and analyze the current state of SRCs in Malaysia and explain how the results can be…
Descriptors: Lifelong Learning, Intelligence Quotient, Resource Centers, Management Information Systems
Gibbs, Martin D. – ProQuest LLC, 2010
Does user influence have an impact on the data quality of an information systems development project? What decision making should users have? How can users effectively be engaged in the process? What is success? User participation is considered to be a critical success factor for Enterprise Resource Planning (ERP) projects, yet there is little…
Descriptors: Information Systems, Systems Development, Decision Making, Phenomenology
Tintamusik, Yanarong – ProQuest LLC, 2010
The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…
Descriptors: Computer Security, Organizational Theories, Information Technology, Banking
Pages: 1  |  ...  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  ...  |  85