IT Policy and Law
Peer Review for material titled "IT Policy and Law"
User Rating for material titled "IT Policy and Law"
Member Comments for material titled "IT Policy and Law"
Personal Collections for material titled "IT Policy and Law"
Learning Exercises for material titled "IT Policy and Law"
Accessibility Info for material titled "IT Policy and Law"
Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help

MERLOT II




        

Search > Material Results >

IT Policy and Law

        

IT Policy and Law

Logo for IT Policy and Law
This resource, Institutional Strategies, focuses on three iterative processes as a way to get some control over the multitudinous issues that cloud computing raises. The first is within an IT organization, the second is informed by stakeholders who represent institutional missions, and the third is how the CIO might represent cloud computing at the senior table.
Material Type: Reference Material
Technical Format: HTML/Text
Date Added to MERLOT: March 16, 2012
Date Modified in MERLOT: January 15, 2014
Author:
Send email to tbm3@cornell.edu
Submitter: Cathy Swift

Quality

  • Reviewed by members of Editorial board for inclusion in MERLOT.
    Editor Review (not reviewed)
  • User Rating (not rated)
  • Comments (none)
  • Learning Exercises (none)
  • Personal Collections (1)
  • Accessibility Info (none)

About

Primary Audience: College General Ed, College Lower Division, College Upper Division, Graduate School
Mobile Compatibility: Not specified at this time
Technical Requirements:
Language: English
Cost Involved: no
Source Code Available: unsure
Accessiblity Information Available: unsure
Creative Commons: unsure

Connections





QR Code for this Page

Browse in Categories

Discussion

Discussion for IT Policy and Law

Log in to participate in the discussions or Register if you are not already a MERLOT member.

Return to Top of Page