NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)13
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 33 results Save | Export
Russell, Kyle – ProQuest LLC, 2014
While accessibility of information technologies is often acknowledged as important, it is frequently not well addressed in practice. The purpose of this study was to examine the work of web developers and content managers to explore why and how accessibility is or is not addressed as an objective as websites are planned, built and maintained.…
Descriptors: Computer System Design, Web Sites, Access to Information, Information Technology
Canadian Association of University Teachers, 2015
Increasingly, university and college administrators are contracting out their institutions' operational information technology (IT) needs. Specifically, this means moving from an IT system with a server based at the institution with an in house IT support staff to a cloud based system outside the institution where most of the staff resources are…
Descriptors: Outsourcing, Information Technology, Universities, Privacy
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Gossen, Andrew – CURRENTS, 2009
Mobile technology is an effective way of conveying information to alumni, especially during a major event. Alumni appreciate not only access to information in a convenient medium, but also efforts to engage with them through new technology. Like so many of the best ideas at Princeton University, the creation of Reunions Mobile emerged from…
Descriptors: Access to Information, Alumni, Information Technology, Alumni Associations
Peer reviewed Peer reviewed
Direct linkDirect link
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Aldrich, Alan W. – EDUCAUSE Quarterly, 2010
The convergence of web-enabled smartphones, the applications designed for smartphone interfaces, and cloud computing is rapidly changing how people interact with each other and with their environments. The commercial sector has taken the lead in creating mobile websites that leverage the capacities of smartphones, and the academic community has…
Descriptors: Foreign Countries, Research Universities, Internet, Handheld Devices
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Woods, Kam A. – ProQuest LLC, 2010
Over the past several decades, millions of digital objects of significant scientific, economic, cultural, and historic value have been published and distributed to libraries and archives on removable media. Providing long-term access to these documents, media files, and software executables is an increasingly complex task because of dependencies…
Descriptors: Computer Software, Research Libraries, Electronic Libraries, Archives
Kumar, Sanjeev – ProQuest LLC, 2009
Information Technology has brought significant benefits to organizations by allowing greater information sharing within and across firm boundaries leading to performance improvements. Emerging technologies such as Service Oriented Architecture (SOA) and Web2.0 have transformed the volume and process of information sharing. However, a comprehensive…
Descriptors: Organizational Effectiveness, Information Technology, Decision Making, Business
Peer reviewed Peer reviewed
PDF on ERIC Download full text
vultur, Sidonia Otilia; Marincas, Delia Adriana – Journal of Applied Quantitative Methods, 2007
In this paper, an evaluation of web sites regarded like projects is discussed. We give an overview of the Web Assessment Index (WAI), by presenting a web sites of Romanian Faculties of Economics case study. The WAI contains five categories: accessibility, access speed, navigability, content and reliability. We analyzed and presented a detailed…
Descriptors: Web Sites, Internet, Foreign Countries, Computer Software Evaluation
Peer reviewed Peer reviewed
Lamont, Melissa – Journal of Academic Librarianship, 1997
Geographic information systems (GIS) are commonly misconceived as expensive and complicated map makers. Although GISs do create maps, they manipulate, organize, and display information, and aid in data documentation and accessibility. Managing GIS services involves not just hardware and software issues but managing digital data. (Author/AEF)
Descriptors: Access to Information, Computer System Design, Information Management, Information Services
Garzotto, Franca; Salmon, Tullio; Pigozzi, Massimiliano – 2003
A framework for the design of multi-channel (MC) applications in the cultural tourism domain is presented. Several heterogeneous interface devices are supported including location-sensitive mobile units, on-site stationary devices, and personalized CDs that extend the on-site experience beyond the visit time thanks to personal memories gathered…
Descriptors: Access to Information, Computer Interfaces, Computer System Design, Culture
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3