Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Comparative Analysis | 5 |
Information Technology | 5 |
Vendors | 4 |
Computer Software Evaluation | 2 |
Higher Education | 2 |
Academic Libraries | 1 |
Audits (Verification) | 1 |
Case Studies | 1 |
Computer Assisted Testing | 1 |
Computer Security | 1 |
Computer Software | 1 |
More ▼ |
Source
Campus-Wide Information… | 1 |
Computers in Libraries | 1 |
Journal of Academic… | 1 |
New Directions for Higher… | 1 |
ProQuest LLC | 1 |
Author
Cibbarelli, Pamela | 1 |
Clarke, Nathan L. | 1 |
Duy, Joanna | 1 |
Furnell, Steven M. | 1 |
Gorr, William | 1 |
Hossler, Don | 1 |
Levy, Yair | 1 |
Ramim, Michelle M. | 1 |
Vaughan, Liwen | 1 |
Wang, Jing | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Book/Product Reviews | 1 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wang, Jing – ProQuest LLC, 2013
Open source software has revolutionized the way people develop software, organize collaborative work, and innovate. The numerous open source software systems that have been created and adopted over the past decade are influential and vital in all aspects of work and daily life. The understanding of open source software development can enhance its…
Descriptors: Peer Evaluation, Open Source Technology, Computer Software, Investigations
Levy, Yair; Ramim, Michelle M.; Furnell, Steven M.; Clarke, Nathan L. – Campus-Wide Information Systems, 2011
Purpose: Concerns for information security in e-learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e-learners' intention to provide multibiometric data and use of multibiometrics…
Descriptors: Computer Assisted Testing, Computer Security, Human Body, Identification
Cibbarelli, Pamela – Computers in Libraries, 1996
Examines library automation product introductions and conversions to new operating systems. Compares user satisfaction ratings of the following library software packages: DOS/Windows, UNIX, Macintosh, and DEC VAX/VMS. Software is rated according to documentation, service/support, training, product reliability, product capabilities, ease of use,…
Descriptors: Comparative Analysis, Computer Software Evaluation, Information Technology, Library Automation
Gorr, William; Hossler, Don – New Directions for Higher Education, 2006
The importance and attention given to information systems are relatively new phenomena in the history of higher education. This chapter documents the ascendancy of information systems in the scheme of institutional priorities and considers the strengths and weaknesses associated with vended and homegrown systems.
Descriptors: Higher Education, Information Systems, Systems Development, Management Systems

Duy, Joanna; Vaughan, Liwen – Journal of Academic Librarianship, 2003
Vendor-provided electronic resource usage statistics are not currently standardized across vendors. This study investigates the feasibility of using locally collected data to check the reliability of vendor-provided data. Vendor-provided data were compared with local data collected from North Carolina State University (NCSU) Libraries' Web…
Descriptors: Academic Libraries, Comparative Analysis, Data Analysis, Data Collection