Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Access to Information | 9 |
Computer Software | 9 |
Computer Software Evaluation | 9 |
Internet | 4 |
Information Retrieval | 3 |
Accessibility (for Disabled) | 2 |
Computer Interfaces | 2 |
Computer Networks | 2 |
Computer System Design | 2 |
Computer Uses in Education | 2 |
Foreign Countries | 2 |
More ▼ |
Source
Active Learning in Higher… | 1 |
Computers in Libraries | 1 |
International Journal of… | 1 |
Journal of Interactive… | 1 |
Journal of Visual Impairment… | 1 |
Online Submission | 1 |
Author
Almeroth, Kevin | 1 |
Banks, Michael A. | 1 |
Belcastro, Frank P. | 1 |
Brunelle, Bette S. | 1 |
Evans, Robert | 1 |
Kesten, Philip R. | 1 |
Knight, Allan | 1 |
McCollum, Roy | 1 |
Miller, L. D. | 1 |
Nugent, Gwen | 1 |
Samal, Ashok | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Speeches/Meeting Papers | 3 |
Opinion Papers | 2 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
United Kingdom | 2 |
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Belcastro, Frank P. – Online Submission, 2006
Assistive devices and assistive software make it possible for the impaired to use computers with all of its processing programs and to access the Internet. Assistive software and assistive devices are described that are specifically intended for students and adults who are blind or visually impaired, students and adults who are deaf or hard of…
Descriptors: Hearing Impairments, Computer Software, Assistive Technology, Sensory Aids

Shragai, Y. – Journal of Visual Impairment & Blindness, 1995
This article examines Windows 95, pointing out differences and improvements from Windows 3.1 for persons with low vision. Windows 95 is seen as providing substantially greater accessibility than Windows 3.1, though the graphical user interface may still pose serious problems for some users with low vision. (DB)
Descriptors: Access to Information, Accessibility (for Disabled), Computer Interfaces, Computer Software
Evans, Robert – Active Learning in Higher Education: The Journal of the Institute for Learning and Teaching, 2006
Plagiarism by students is seen as an increasing problem. The fear is that students will use the internet to obtain analysis, interpretation or even complete assignments and then submit these as their own work. Electronic plagiarism detection services may help to prevent such unfair practice but, in doing so, they create a new problem: certifying…
Descriptors: Plagiarism, Internet, Higher Education, Computer Software
Banks, Michael A. – Computers in Libraries, 1998
Examines issues and decision-making involved in restricting Internet access in libraries, for the most part favoring filtering devices. Questions to consider when selecting a filtering program are provided. Some of the better filtering programs are described, and Web addresses are included for each. Security risks associated with Java and…
Descriptors: Access to Information, Censorship, Computer Software, Computer Software Evaluation
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Brunelle, Bette S. – 1996
Almost overnight, the World Wide Web has made the solution of "classic" information retrieval problems a pressing commercial goal. The various information retrieval solutions being offered on the Web are quite familiar to the librarian. The various Web search sites make use of "traditional" inverted indexes, manual indexing,…
Descriptors: Access to Information, Computer Software, Computer Software Evaluation, Evaluation Methods
Kesten, Philip R. – 1997
ERes, an electronic reserve system, allows faculty and staff to make documents available on the World Wide Web without requiring any technical skills. The system was developed at Santa Clara University (California). This paper provides an overview of ERes and includes: technical information; the user interface for entering and viewing documents;…
Descriptors: Access to Information, Computer Networks, Computer Software, Computer Software Evaluation