NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)10
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 56 results Save | Export
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Chetty, Marshini – ProQuest LLC, 2011
Technological infrastructure is often taken for granted in our day to day lives until it breaks down, usually because it invisibly supports tasks otherwise. Previous work in HCI has focused on how people react and deal with breaks in infrastructure as well as how to help people to fix or exploit these breaks. However, few have sought to understand…
Descriptors: Computer Networks, Physical Environment, Family Environment, Computer System Design
Huang, Kuo Hung, Ed. – InTech, 2011
Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…
Descriptors: Computer Networks, Publishing Industry, Electronic Libraries, Educational Resources
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Gossen, Andrew – CURRENTS, 2009
Mobile technology is an effective way of conveying information to alumni, especially during a major event. Alumni appreciate not only access to information in a convenient medium, but also efforts to engage with them through new technology. Like so many of the best ideas at Princeton University, the creation of Reunions Mobile emerged from…
Descriptors: Access to Information, Alumni, Information Technology, Alumni Associations
Peer reviewed Peer reviewed
Direct linkDirect link
McEachron, D. L.; Bach, C.; Sualp, M. – Campus-Wide Information Systems, 2012
Purpose: The purpose of this paper is to examine existing learning innovation systems and propose a systematic methodology of delivering educational innovations in the right amount, in the right place and at the right time. Design/methodology/approach: Higher education is not effectively incorporating new discoveries in cognitive science and human…
Descriptors: Knowledge Management, Research Papers (Students), Educational Innovation, Information Transfer
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Everhart, Nancy; Mardis, Marcia; Johnston, Melissa; Smith, Daniella – Online Submission, 2009
For Americans to engage in a global information society, it is critical that they have access to high-speed, high-bandwidth Internet, meaning broadband. Network connectivity opens up a wealth of possibilities to K-12 educators. While it has the potential to result in fundamental changes in teaching methods, it can definitely be used to enhance…
Descriptors: Educational Opportunities, Internet, Access to Information, Computer Networks
Machovec, George S. – Online Libraries and Microcomputers, 1995
Describes the Government Information Locator Service (GILS), designed to help the public identify and acquire federal government information as part of the evolving National Information Infrastructure. Highlights include background information; use of GILS through the Internet; and agency-based information services, including the Government…
Descriptors: Access to Information, Computer Networks, Computer System Design, Federal Government
Peer reviewed Peer reviewed
Direct linkDirect link
Heckner, Markus; Schworm, Silke; Wolff, Christian – Journal of Educational Technology Systems, 2010
Many current (online) help systems fail because users refuse to use them or, even if they do so, they do not perceive them as helpful. There is an obvious gap between the intentions of the help content authors and the achievement of objectives concerning the perceived usefulness by help users. Problems may be divided into psychological and…
Descriptors: Feedback (Response), Prior Learning, Psychology, Internet
Reade, Tripp – Computers in Libraries, 2001
MyLibrary@NCState (North Carolina State University) is a customizable Web interface to the electronic resources licensed by the library and to the pages that compose the Web sites of the library and the university. The author, part of the MyLibrary@NCState management team, shares the thoughts and ideology behind the design of this personalized…
Descriptors: Access to Information, Computer Networks, Computer System Design, Higher Education
Doctor, Ronald – Wilson Library Bulletin, 1994
Discusses the concept of information democracy, or access to information, in relation to information delivery; computerized community-based information systems, including grass-roots nonprofit organizations and private sector activities; the National Information Infrastructure (NII); empowerment; concepts of social justice; and designing the NII.…
Descriptors: Access to Computers, Access to Information, Community Information Services, Computer Networks
Donel, John; Holbo, Richard – Online, 1993
Describes a successful experiment at Oregon State University in which user access to an extensive CD-ROM library was improved through the development of a networked environment. Discussed are dial-in and Telnet access for users both on and off campus, future possibilities, and subscription and licensing fees. (three references) (EA)
Descriptors: Access to Information, College Libraries, Computer System Design, Fees
Detlor, Brian – 1998
This paper proposes a user-centered framework for intranet design that is based on an understanding of people, their typical problems, information behaviors, and situated contexts. It is argued that by adopting such an approach, intranets can be designed which facilitate organizational information access and use. The first section of the paper…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer System Design
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4