Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 13 |
Descriptor
Access to Information | 33 |
Computer System Design | 33 |
Information Technology | 33 |
Foreign Countries | 8 |
Information Management | 8 |
Information Retrieval | 8 |
Information Sources | 8 |
Higher Education | 7 |
Computer Mediated… | 6 |
User Needs (Information) | 6 |
World Wide Web | 6 |
More ▼ |
Source
Author
AL Faresi, Ahmed | 1 |
Aldrich, Alan W. | 1 |
Almeroth, Kevin | 1 |
Amin, Rohan Mahesh | 1 |
Arms, Caroline, Ed. | 1 |
Borgman, Christine L. | 1 |
Cole, Timothy W. | 1 |
Coombs, Norman | 1 |
Estebanell, M. | 1 |
Fabregat, R. | 1 |
Fahy, Sarah | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 7 |
Postsecondary Education | 3 |
Adult Education | 2 |
Audience
Practitioners | 2 |
Administrators | 1 |
Media Staff | 1 |
Location
United States | 3 |
Canada | 2 |
California | 1 |
India | 1 |
Indiana | 1 |
Italy | 1 |
Japan | 1 |
Romania | 1 |
Spain | 1 |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Health Insurance Portability… | 1 |
Telecommunications Act 1996 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Russell, Kyle – ProQuest LLC, 2014
While accessibility of information technologies is often acknowledged as important, it is frequently not well addressed in practice. The purpose of this study was to examine the work of web developers and content managers to explore why and how accessibility is or is not addressed as an objective as websites are planned, built and maintained.…
Descriptors: Computer System Design, Web Sites, Access to Information, Information Technology
Canadian Association of University Teachers, 2015
Increasingly, university and college administrators are contracting out their institutions' operational information technology (IT) needs. Specifically, this means moving from an IT system with a server based at the institution with an in house IT support staff to a cloud based system outside the institution where most of the staff resources are…
Descriptors: Outsourcing, Information Technology, Universities, Privacy
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Gossen, Andrew – CURRENTS, 2009
Mobile technology is an effective way of conveying information to alumni, especially during a major event. Alumni appreciate not only access to information in a convenient medium, but also efforts to engage with them through new technology. Like so many of the best ideas at Princeton University, the creation of Reunions Mobile emerged from…
Descriptors: Access to Information, Alumni, Information Technology, Alumni Associations
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Aldrich, Alan W. – EDUCAUSE Quarterly, 2010
The convergence of web-enabled smartphones, the applications designed for smartphone interfaces, and cloud computing is rapidly changing how people interact with each other and with their environments. The commercial sector has taken the lead in creating mobile websites that leverage the capacities of smartphones, and the academic community has…
Descriptors: Foreign Countries, Research Universities, Internet, Handheld Devices
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Woods, Kam A. – ProQuest LLC, 2010
Over the past several decades, millions of digital objects of significant scientific, economic, cultural, and historic value have been published and distributed to libraries and archives on removable media. Providing long-term access to these documents, media files, and software executables is an increasingly complex task because of dependencies…
Descriptors: Computer Software, Research Libraries, Electronic Libraries, Archives
Kumar, Sanjeev – ProQuest LLC, 2009
Information Technology has brought significant benefits to organizations by allowing greater information sharing within and across firm boundaries leading to performance improvements. Emerging technologies such as Service Oriented Architecture (SOA) and Web2.0 have transformed the volume and process of information sharing. However, a comprehensive…
Descriptors: Organizational Effectiveness, Information Technology, Decision Making, Business
vultur, Sidonia Otilia; Marincas, Delia Adriana – Journal of Applied Quantitative Methods, 2007
In this paper, an evaluation of web sites regarded like projects is discussed. We give an overview of the Web Assessment Index (WAI), by presenting a web sites of Romanian Faculties of Economics case study. The WAI contains five categories: accessibility, access speed, navigability, content and reliability. We analyzed and presented a detailed…
Descriptors: Web Sites, Internet, Foreign Countries, Computer Software Evaluation

Lamont, Melissa – Journal of Academic Librarianship, 1997
Geographic information systems (GIS) are commonly misconceived as expensive and complicated map makers. Although GISs do create maps, they manipulate, organize, and display information, and aid in data documentation and accessibility. Managing GIS services involves not just hardware and software issues but managing digital data. (Author/AEF)
Descriptors: Access to Information, Computer System Design, Information Management, Information Services
Garzotto, Franca; Salmon, Tullio; Pigozzi, Massimiliano – 2003
A framework for the design of multi-channel (MC) applications in the cultural tourism domain is presented. Several heterogeneous interface devices are supported including location-sensitive mobile units, on-site stationary devices, and personalized CDs that extend the on-site experience beyond the visit time thanks to personal memories gathered…
Descriptors: Access to Information, Computer Interfaces, Computer System Design, Culture

Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education