Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Software Evaluation | 23 |
Information Networks | 23 |
Computer Networks | 7 |
Information Systems | 7 |
Internet | 7 |
Access to Information | 6 |
Information Technology | 6 |
Computer System Design | 5 |
Comparative Analysis | 4 |
Database Management Systems | 4 |
Elementary Secondary Education | 4 |
More ▼ |
Source
Author
Atkinson, Roderick D. | 1 |
Barry, Jeff | 1 |
Breitbach, William | 1 |
Bucher, Tobias | 1 |
Chretien, Wendy | 1 |
Cundiff, Jacob | 1 |
Dorrah, Harvey, Jr. | 1 |
Emery, Jill | 1 |
Foster, Stuart J. | 1 |
George, Carole A. | 1 |
Gericke, Anke | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 7 |
Adult Education | 2 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Practitioners | 1 |
Teachers | 1 |
Location
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Breitbach, William – Computers in Libraries, 2012
Competition in the virtual reference market got really hot this past summer. Recent developments in virtual reference offerings suggest the market is much more dynamic than most people would have imagined a short time ago. With Google's acquisition of Meebo and its subsequent decision to shut down the chat widget service, many libraries scrambled…
Descriptors: Library Services, Reference Services, Library Development, Online Systems
Kwanya, Tom; Stilwell, Christine; Underwood, Peter G. – Journal of Librarianship and Information Science, 2013
Using the "point oh" naming system for developments in librarianship is attracting debate about its appropriateness, basis and syntax and the meaning and potential of Library 2.0. Now a new term, Library 3.0, has emerged. Is there is any significant difference between the two models? Using documentary analysis to explore the terms, the…
Descriptors: Information Networks, Library Automation, Library Development, Library Services
Cundiff, Jacob; McCallum, Taylor; Rich, Andrew; Truax, Michael; Ward, Tamara; Havelka, Douglas – Journal of Information Systems Education, 2015
The launch of HealthCare.gov, the website of the Affordable Care Act (AKA Obamacare), was a major public relations disaster for the Obama administration. This case examines some of the factors that contributed to the failure of the launch and then details how Optum, an information technology service provider, considered the opportunity provided by…
Descriptors: Case Studies, Information Systems, Database Management Systems, Online Vendors
Trust, Torrey – Journal of Digital Learning in Teacher Education, 2012
In the information age, students must learn to navigate and evaluate an expanding network of information. Highly effective teachers model this process of information analysis and knowledge acquisition by continually learning through collaboration, professional development, and studying pedagogical techniques and best practices. Many teachers have…
Descriptors: Web Sites, Web 2.0 Technologies, Computer Software Evaluation, Teacher Collaboration
Emery, Jill – Journal of Electronic Resources Librarianship, 2009
Twitter provides rapid information in a short form, and it is extremely easy to follow the updates of others because of myriad software applications with which it works on both mobile devices and traditional computing hardware. Currently, most academic librarians are using Twitter primarily as a tool at library conferences and seminars to capture…
Descriptors: Internet, Librarians, Use Studies, Information Networks
Shi, Xue-yun – Online Submission, 2007
"EGao" is a network producing form and is popular in campus. In order to amuse the masses, it changed and reformed films, TV, picture menus and songs by imitating, overdrawing and self-betrayal means. The impact of "EGao" is greater and greater in the young, especially in the university, it has become a fashion. The paper analyzed its concepts,…
Descriptors: Social Psychology, Hypermedia, Computer Software Evaluation, Information Networks
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Winter, Robert; Gericke, Anke; Bucher, Tobias – Educational Technology & Society, 2008
Business intelligence and information logistics have become an important part of teaching curricula in recent years due to the increased demand for adequately trained graduates. Since these fields are characterized by a high amount of software and methodology innovations, teaching materials and teaching aids require constant updating. Teradata has…
Descriptors: Feedback (Response), Intelligence, Action Research, Management Information Systems
Chretien, Wendy – Campus Technology, 2008
Emergency notification has become a critical component of every higher education institution's overall emergency plan, as incidents across the country have galvanized campus safety officials to find more ways to notify their campus populations. Emergency notification systems can help get and keep students, faculty members, and staff out of harm's…
Descriptors: School Security, School Safety, Emergency Programs, Crisis Management
Helfer, Joe – Searcher, 1997
Analyzes whether push technology is a threat or opportunity for online searchers. Outlines key functions of push technology products and defines key technology terms. Illustrates how the role of the online searcher changes with push technology. (AEF)
Descriptors: Computer Networks, Computer Software Evaluation, Information Networks, Information Technology
Gupta, Amardeep – Journal of Educational Technology, 2005
Current search engines--even the constantly surprising Google--seem unable to leap the next big barrier in search: the trillions of bytes of dynamically generated data created by individual web sites around the world, or what some researchers call the "deep web." The challenge now is not information overload, but information overlook.…
Descriptors: Search Engines, Computer System Design, Computer Software Evaluation, Information Retrieval
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Dorrah, Harvey, Jr.; Whale, David E. – Journal of School Public Relations, 2004
The purpose of this research was to ascertain teacher perceptions of and involvement in website development, maintenance, and appropriateness. One hundred two teachers responded to a web-based survey asking them about their school or district websites. The role of teachers in this endeavor appears appropriate but underutilized. Overall, teachers…
Descriptors: Internet, Teacher Attitudes, Teacher Participation, Web Sites
Ruben, Barbara – Environmental Action, 1994
Reviews a number of interactive environmental computer education networks and software packages. Computer networks include National Geographic Kids Network, Global Lab, and Global Rivers Environmental Education Network. Computer software involve environmental decision making, simulation games, tropical rainforests, the ocean, the greenhouse…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Software Evaluation, Computer Uses in Education
Previous Page | Next Page ยป
Pages: 1 | 2