NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,231 to 1,245 of 1,264 results Save | Export
Thomson, Nancy S. – 1996
The objectives of an innovative teaching model implemented in a course at Northwest Missouri State University Department of Science/Information System are to: (1) use the Total Quality Management (TQM) concept in course design and implementation in the MIS (management information systems) curriculum; (2) develop attitudes and behaviors associated…
Descriptors: Active Learning, College Instruction, College Seniors, Computer Mediated Communication
Clagett, Craig A. – 1998
The Maryland Community Colleges Technology Council conducted a survey of all 18 community colleges in Maryland during the spring of 1998 to determine the number and salaries of full-time staff supporting campus information technologies. Collectively, the colleges had 377 full-time positions authorized, with 305 positions filled. The organization…
Descriptors: College Administration, Community Colleges, Comparative Analysis, Educational Technology
CAUSE, Boulder, CO. – 1989
Seven papers from the 1988 CAUSE conference's Track V, Impact of Departmental Computing, are presented. They include: "An Approach to Departmental Computing Support" (Cedric S. Bennett); "DEANS--A Fully Integrated Academic Network System" (Eloy Areu, Albert Klavon, and Robert Munn); "Departmental Systems for Administrative…
Descriptors: Administrative Organization, Administrators, Change Strategies, Computer Software
CAUSE, Boulder, CO. – 1989
Seven papers from the 1988 CAUSE conference's Track VI, Outstanding Applications, are presented. They include: "Designing DB2 Data Bases Using Entity-Relationship Modeling: A Case Study--The LSU System Worker's Compensation Project" (Cynthia M. Hadden and Sara G. Zimmerman); "Integrating Information Technology: Prerequisites for…
Descriptors: Administrative Policy, Change Strategies, Computer Uses in Education, Databases
CAUSE, Boulder, CO. – 1989
Six papers from the 1988 CAUSE conference's Track VI, Hardware/Software/Networking Strategies, are presented. They include: "Technological Synergies Are No Accident!" (James I. Penrod and Michael G. Dolence); "Augmentation Quotient" (William H. Branch); "Step 2: Of Bridges and Gateways--The Linking of Winthrop College's…
Descriptors: Administrative Policy, Case Studies, Change Strategies, Computer Networks
Ramirez, Alejandro; Rivard, Suzanne – 1998
Using the cognitive fit paradigm as a theoretical framework, this study compared the problem-solving performance of users of a hypertext-based learning aid to the performance of users of a computer-based linear text learning aid. Subjects were 103 undergraduate MIS (Management Information Systems) majors enrolled in an information systems analysis…
Descriptors: Appropriate Technology, Business Administration Education, Cognitive Processes, Comparative Analysis
Schiefelbein, Ernesto – Prospects, 1990
Analyzes Latin American educational research phases--the artisan and industrial. During the artisan phase (1950s-early 1970s), university scholars conducted isolated projects with limited access to information. Research centers, government supports, and information networks characterize the industrial period (post-mid 1970s). Argues information…
Descriptors: Access to Information, Databases, Diffusion (Communication), Educational History
Peer reviewed Peer reviewed
Kerschner, Joan G., Ed. – Library Hi Tech, 1996
Describes statewide networks of public, academic, and school libraries in Nevada, including dial-up access to state agencies and archives for rural libraries; Internet access; automation in county library districts; computer-based services; and the Nevada Education Online Network that includes libraries of the University and Community College…
Descriptors: Academic Libraries, Access to Information, Community Colleges, Counties
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Abraham, Thomas – 1998
This paper describes the creation of an active learning environment within an Internet-based course in the School of Business, Government and Technology at Kean University (New Jersey). The introductory Management Information Systems (MIS) course is an elective that has become increasingly popular with junior and senior business majors. The main…
Descriptors: Active Learning, Assignments, Business Administration Education, Comparative Analysis
CAUSE, Boulder, CO. – 1989
Seven papers from the 1988 CAUSE conference's Track IV, Organization and Personnel Issues, are presented. They include: "Positive Management: Techniques and Retreats" (Janet Wixson); "Data Administration: What Is It, Where Is It, How Is It Done?" (Karen L. Miselis, Lawrence A. Jordan, and Ronald Hoover); "The Departmental…
Descriptors: Administrative Organization, Administrative Policy, Change Strategies, College Administration
Tanniru, Mohan – 1998
The Applied Technology in Business program at Oakland University (Michigan) is a business minor that focuses on training business students in the proactive use of information technologies to solve business problems. The program is sponsored by corporations that provide real business problems for students to solve. Students learn problem solving,…
Descriptors: Business Administration Education, Computer Uses in Education, Curriculum Development, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Jakovljevic, Maria; Ankiewicz, Piet; De swardt, Estelle; Gross, Elna – International Journal of Technology and Design Education, 2004
Traditional instructional methodology in the Information System Design (ISD) environment lacks explicit strategies for promoting the cognitive skills of prospective system designers. This contributes to the fragmented knowledge and low motivational and creative involvement of learners in system design tasks. In addition, present ISD methodologies,…
Descriptors: Focus Groups, Computer Software, Problem Solving, Information Systems
Lazarus, Wendy; Lipper, Laurie – 1996
Computers and online services are becoming a part of children's lives. This guide is designed to introduce parents to the Information Superhighway and to parenting in a world of computers and new forms of media. Prepared by the Children's Partnership, with assistance from the National PTA and the National Urban League, this guide provides tools…
Descriptors: Access to Computers, Child Safety, Children, Computer Mediated Communication
Adams, Kate; Bicknell-Holmes, Tracy; Latta, Gail F. – 1998
There are three challenges academic institutions must address in order to achieve the goal of ensuring that distant students are afforded the opportunities of independent learning: (1) academic libraries must effectively utilize technology to make the information resources in their research collections accessible to distant students; (2) academic…
Descriptors: Academic Libraries, Access to Information, Coordinators, Curriculum Development
Pages: 1  |  ...  |  75  |  76  |  77  |  78  |  79  |  80  |  81  |  82  |  83  |  84  |  85