NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Peer reviewed Peer reviewed
Edwards, Kirstie; Van Mele, Isabel; Verheust, Mieke; Spaepen, Arthur – Information Technology and Libraries, 1997
Three user interfaces to LIBIS, a library catalog accessible through the Internet, were evaluated for use by people who are motor impaired to identify how interface design influences the motor actions necessary to operate the system. Problems and recommendations related to simplicity, consistency, instinctiveness, interaction/feedback, and…
Descriptors: Access to Information, Comparative Analysis, Computer Interfaces, Computer Software Evaluation