NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
vultur, Sidonia Otilia; Marincas, Delia Adriana – Journal of Applied Quantitative Methods, 2007
In this paper, an evaluation of web sites regarded like projects is discussed. We give an overview of the Web Assessment Index (WAI), by presenting a web sites of Romanian Faculties of Economics case study. The WAI contains five categories: accessibility, access speed, navigability, content and reliability. We analyzed and presented a detailed…
Descriptors: Web Sites, Internet, Foreign Countries, Computer Software Evaluation
Peer reviewed Peer reviewed
Staninger, Steven W. – Government Publications Review, 1991
This evaluation of means of accessing data on the U.S. Census Bureau CD-ROM Test Disc 2 describes computer hardware configurations considered in determining the most efficient method of manipulating the data, and mentions software options. Two dBASE configurations are compared, and it is concluded that the 80386 is essential for efficient…
Descriptors: Access to Information, Computer Software Evaluation, Database Management Systems, Depository Libraries
Simpson, Carol – Book Report, 1996
Guides librarians in evaluating "filtering" software which schools may purchase for restricting access to potentially inappropriate Internet sites. This article discusses the workings of filtering programs and practical and ethical questions such as: how sites are restricted, who decides, and whether transactions are monitored.…
Descriptors: Access to Information, Computer Software Evaluation, Computer Software Selection, Consumer Protection
Greenfield, Rich – 1997
The author argues that traditional library cataloging (MARC) and the online public access catalog (OPAC) are in collision with the world of the Internet because items in electronic formats undergo MARC cataloging only on a very selective basis. Also the library profession initially isolated itself from World Wide Web development by predicting no…
Descriptors: Access to Information, Authority Control (Information), Automatic Indexing, Bibliographic Records