Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Interfaces | 3 |
Information Technology | 3 |
Problems | 3 |
Computer System Design | 2 |
Animation | 1 |
Computer Security | 1 |
Computer Software | 1 |
Computer Software Evaluation | 1 |
Costs | 1 |
Design Requirements | 1 |
Guidelines | 1 |
More ▼ |
Source
Behaviour & Information… | 1 |
Publication Type
Reports - Descriptive | 2 |
Speeches/Meeting Papers | 2 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bederson, Benjamin B. – Behaviour & Information Technology, 2011
Zoomable user interfaces (ZUIs) have received a significant amount of attention in the 18 years since they were introduced. They have enjoyed some success, and elements of ZUIs are widely used in computers today, although the grand vision of a zoomable desktop has not materialised. This paper describes the premise and promise of ZUIs along with…
Descriptors: Design Requirements, Computer Interfaces, Innovation, Research and Development
Milekic, Slavko – 2002
Rapid proliferation of different types of interaction devices that use more natural channels (voice, touch, gesture) for interfacing with the digital medium illustrates the trend towards the creation of more "humane" interaction mechanisms. However, the current historical paradox is that modern technological advances are dramatically…
Descriptors: Computer Interfaces, Information Technology, Interaction, Man Machine Systems
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design