Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Education

The Effect Innovation Of Information Technology, Product, Work, And Service Toward Development Performance Academic Business Laboratory In Indonesia, Ilham M, Tanti Handriana, Fendy Suhariadi Jan 2021

The Effect Innovation Of Information Technology, Product, Work, And Service Toward Development Performance Academic Business Laboratory In Indonesia, Ilham M, Tanti Handriana, Fendy Suhariadi

Library Philosophy and Practice (e-journal)

This study was conducted to compile a work plan and create an integrated laboratory information system and improve academic services at Uin Sunan Ampel Surabaya based on the implementation of work programs towards a world class university. The purpose of this research activity is to design and implement a system capable of providing work information for each manager of the integration laboratory and maximizing the utilization of the integration laboratory so that the use of the integration laboratory is better and more precise. The results of this research can form an integrated laboratory information system that can optimize the performance …


Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman Oct 2020

Analysis Effect Of Audit Information Technology : Green Technology, Smart System And Innovation Behavior Working For Improving Business Services University In Indonesia, Merlin Apriliyanti, Ilham M, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study was conducted to determine the effectiveness and efficiency of the use of technology and integrated information systems and recommend the development of new systems at PTKIN (UIN Sunan Ampel Surabaya and UIN Maulana Malik Ibrahim Malang). The study of information technology management in tertiary institutions aims to measure the extent to which the application of information technology is able to support the activities of the Tri Dharma College in order to achieve world class universities. In measuring the results of the audit of information technology management the tertiary institution will conduct evaluation, monitoring and further development of information …


Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2014

Open Source Software To Enhance The Stem Learning Environment, Maurice Dawson, Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …