Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Access to Information | 6 |
Computer Software Evaluation | 6 |
Information Technology | 6 |
Computer System Design | 3 |
Internet | 3 |
Content Analysis | 2 |
Program Effectiveness | 2 |
Programming | 2 |
Statistical Analysis | 2 |
Authority Control… | 1 |
Automatic Indexing | 1 |
More ▼ |
Source
Book Report | 1 |
Government Publications Review | 1 |
Journal of Applied… | 1 |
Journal of Interactive… | 1 |
ProQuest LLC | 1 |
Author
Almeroth, Kevin | 1 |
Amin, Rohan Mahesh | 1 |
Greenfield, Rich | 1 |
Knight, Allan | 1 |
Marincas, Delia Adriana | 1 |
Simpson, Carol | 1 |
Staninger, Steven W. | 1 |
vultur, Sidonia Otilia | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
California | 1 |
Romania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
vultur, Sidonia Otilia; Marincas, Delia Adriana – Journal of Applied Quantitative Methods, 2007
In this paper, an evaluation of web sites regarded like projects is discussed. We give an overview of the Web Assessment Index (WAI), by presenting a web sites of Romanian Faculties of Economics case study. The WAI contains five categories: accessibility, access speed, navigability, content and reliability. We analyzed and presented a detailed…
Descriptors: Web Sites, Internet, Foreign Countries, Computer Software Evaluation

Staninger, Steven W. – Government Publications Review, 1991
This evaluation of means of accessing data on the U.S. Census Bureau CD-ROM Test Disc 2 describes computer hardware configurations considered in determining the most efficient method of manipulating the data, and mentions software options. Two dBASE configurations are compared, and it is concluded that the 80386 is essential for efficient…
Descriptors: Access to Information, Computer Software Evaluation, Database Management Systems, Depository Libraries
Simpson, Carol – Book Report, 1996
Guides librarians in evaluating "filtering" software which schools may purchase for restricting access to potentially inappropriate Internet sites. This article discusses the workings of filtering programs and practical and ethical questions such as: how sites are restricted, who decides, and whether transactions are monitored.…
Descriptors: Access to Information, Computer Software Evaluation, Computer Software Selection, Consumer Protection
Greenfield, Rich – 1997
The author argues that traditional library cataloging (MARC) and the online public access catalog (OPAC) are in collision with the world of the Internet because items in electronic formats undergo MARC cataloging only on a very selective basis. Also the library profession initially isolated itself from World Wide Web development by predicting no…
Descriptors: Access to Information, Authority Control (Information), Automatic Indexing, Bibliographic Records