Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Interfaces | 4 |
Computer System Design | 4 |
Problems | 4 |
Information Technology | 2 |
Access to Education | 1 |
Animation | 1 |
Computer Security | 1 |
Computer Software | 1 |
Computer Software Evaluation | 1 |
Copyrights | 1 |
Costs | 1 |
More ▼ |
Author
Armitage, Nicholas | 1 |
Bederson, Benjamin B. | 1 |
Bowerman, Chris | 1 |
Oviatt, Sharon | 1 |
Senn, Gary J. | 1 |
Smyth, Thomas J. C. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bederson, Benjamin B. – Behaviour & Information Technology, 2011
Zoomable user interfaces (ZUIs) have received a significant amount of attention in the 18 years since they were introduced. They have enjoyed some success, and elements of ZUIs are widely used in computers today, although the grand vision of a zoomable desktop has not materialised. This paper describes the premise and promise of ZUIs along with…
Descriptors: Design Requirements, Computer Interfaces, Innovation, Research and Development

Oviatt, Sharon – Human-Computer Interaction, 1997
Analyzes interfaces supporting spoken, pen-based, and multimodal input for their effectiveness in interacting with interactive map systems. Results identified performance difficulties with speech-only map interactions that declined substantially when people could interact multimodally. Analyses also indicated that map displays can be structured to…
Descriptors: Computer Interfaces, Computer System Design, Interaction, Maps
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Armitage, Nicholas; Bowerman, Chris – Computer Assisted Language Learning, 2005
The LOM (Learning Object Model) approach to courseware design seems to be driven by a desire to increase access to education as well as use technology to enable a higher staff-student ratio than is currently possible. The LOM standard involves the use of standard metadata descriptions of content and adaptive content engines to deliver the…
Descriptors: Access to Education, Language Teachers, Internet, Copyrights