NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ko, C. C.; Cheng, C. D. – Computers & Education, 2008
Electronic examination systems, which include Internet-based system, require extremely complicated installation, configuration and maintenance of software as well as hardware. In this paper, we present the design and development of a flexible, easy-to-use and secure examination system (e-Test), in which any commonly used computer can be used as a…
Descriptors: Computer Assisted Testing, Computers, Program Effectiveness, Examiners
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Marzo-Lazaro, J. L.; Verdu-Carbo, T.; Fabregat-Gesa, R. – 1998
This paper describes a solution to the user identification and tracking problem within an educational World Wide Web environment. The paper begins with an overview of the Teaching Support System project at the University of Girona (Spain); the main objective of the project is to create an integrated set of tools for teachers to use to create and…
Descriptors: Computer Interfaces, Computer Security, Computer Software Development, Computer System Design
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design