NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Whitney, Michael – Information Systems Education Journal, 2020
Curb cuts and automatic doors are a commonplace in the physical world as they provide access to our buildings for persons with disabilities. In the world of the web, millions of individuals have the legal right to rely on electronic curb cuts so they too can access the web. To this end, a new generation of information systems graduates must…
Descriptors: Accessibility (for Disabled), Design, Web Sites, College Students
Chan, Pat P. W. – International Association for Development of the Information Society, 2014
With the advancement of information and communication technology, collaboration and knowledge sharing through technology is facilitated which enhances the learning process and improves the learning efficiency. The purpose of this paper is to review the methods of assessment and strategy of collaboration and knowledge sharing in a computer course,…
Descriptors: Information Technology, Access to Information, Technology Uses in Education, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers