You are here:

Educause Quarterly

2008 Volume 31, Number 3

Search this issue

Table of Contents

Number of articles: 10

  1. Security Metrics: A Solution in Search of a Problem

    Joel Rosenblatt

    Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers... More

    pp. 8-11

    View Abstract
  2. Do Emergency Text Messaging Systems Put Students in More Danger?

    John Bambenek & Agnieszka Klus

    Cell phones have become prevalent on college campuses. Most students use them as their primary phone to avoid changing phone service every year or dealing with university-based long-distance... More

    pp. 12-16

    View Abstract
  3. Faculty Development Programming: If We Build It, Will They Come?

    Ann Taylor & Carol McQuiggan

    The number of courses offered online grows every year, resulting in an increasing number of higher education faculty entering a virtual classroom for the first time. It has been well documented... More

    pp. 28-37

    View Abstract
  4. Collaborative Development: A New Culture Affects an Old Organization

    Jim Phelps & Terry Ruzicka

    At the University of Wisconsin (UW)-Madison, the Registrar's Office and the Division of Information Technology (DoIT) apply a collaborative development process to joint projects. This model differs... More

    pp. 38-45

    View Abstract
  5. Moving to Moodle: Reflections Two Years Later

    Ining Tracy Chao

    Selecting and implementing a learning management system (LMS) is an important task for many higher education institutions, which can consult various resources when embarking on such endeavors.... More

    pp. 46-52

    View Abstract
  6. Information Sharing for IT Security Professionals

    Rodney J. Petersen

    Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their... More

    pp. 54-56

    View Abstract
  7. Growing the Next Generation of Leaders

    Rebecca Gould, Elizabeth Unger & Annie Bacon

    Most CIOs and IT leaders agree that the community must work deliberately to develop talent among the IT staff, not wait for it to appear. However, responsibility for professional development also... More

    pp. 58-61

    View Abstract
  8. Leveraging Technology and Human Systems in an Emergency

    Stan Molinski

    In this article, the author discusses the important relationship between robust technical and human systems when face with emergency. It offers several strategies as essential to reacting... More

    pp. 63-65

    View Abstract
  9. Directing Traffic: Managing Internet Bandwidth Fairly

    Thomas A. Paine & Tyler J. Griggs

    Educational institutions today face budgetary restraints and scarce resources, complicating the decision of how to allot bandwidth for campus network users. Additionally, campus concerns over peer-... More

    pp. 66-70

    View Abstract
  10. Online Social Media in Crisis Events

    Leysia Palen

    As social media--which includes blogs, social networking environments, person-to-person and broadcast messaging, and other Web 2.0 applications--becomes more pervasive, their use has significant... More

    pp. 76-78

    View Abstract