Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Author
Benson, Allen C. | 1 |
Bordac, Sarah | 1 |
Edwards, Kirstie | 1 |
Ford, Kevin C. | 1 |
Glover, M. Jason | 1 |
Horn, G. | 1 |
Kim, Jinmook | 1 |
Kram, Lorraine | 1 |
Kriz, Harry M. | 1 |
Kroselberg, D. | 1 |
Mattord, Herbert J. | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Research | 5 |
Reports - Descriptive | 4 |
Guides - Non-Classroom | 2 |
Speeches/Meeting Papers | 2 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
Rhode Island | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mattord, Herbert J. – ProQuest LLC, 2012
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
Descriptors: Internet, Electronic Learning, Comparative Analysis, Benchmarking
Wheeler, Brad; Waggener, Shelton – EDUCAUSE Review, 2009
The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…
Descriptors: Higher Education, Internet, Computer Software, Computers
Bordac, Sarah; Rainwater, Jean – Journal of Web Librarianship, 2008
This article presents a case study in user-centered design that explores the needs and preferences of undergraduate users. An analysis of LibQual+ and other user surveys, interviews with public service staff, and a formal American with Disabilities Act accessibility review served as the basis for planning a redesign of the Brown University…
Descriptors: Focus Groups, Testing, Information Systems, Libraries
Schrock, Kathleen – MultiMedia Schools, 1997
Presents guidelines for making a Web site noticeable. Discusses submitting the URL to directories, links, and announcement lists, and sending the site over the server via FTP to search engines. Describes how to index the site with "Title,""Heading," and "Meta" tags. (AEF)
Descriptors: Computer Networks, Computer System Design, Directories, Indexing
Oard, Douglas; Kim, Jinmook – Proceedings of the ASIST Annual Meeting, 2001
Presents a framework for modeling the content of information objects such as documents and video programs based on observation of how users interact with those objects in the course of information seeking and use. Identifies four categories of potentially observable user behaviors: examination, retention, reference, and annotation. (AEF)
Descriptors: Behavior, Computer System Design, Information Retrieval, Information Seeking
Nahl, Diane; Meer, Muhammad Pervaiz – Proceedings of the ASIS Annual Meeting, 1997
Users in this study of two Web browsers had significantly higher success with Internet Explorer than with Netscape Navigator, made a variety of errors in several tasks, and those reporting higher self-confidence had significantly higher success scores. Results confirm the expectation that affective and cognitive measures add valuable user-centered…
Descriptors: Computer System Design, Feedback, Information Retrieval, Information Seeking

Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines

Kriz, Harry M.; Glover, M. Jason; Ford, Kevin C. – Journal of Interlibrary Loan, Document Delivery & Information Supply, 1998
Describes ILLiad (Interlibrary Loan Internet Accessible Database), software that examines the current state of interlibrary loan borrowing requests at Virginia Polytechnic Institute and State University. Topics include system requirements, user procedures, staff procedures, copyright clearance, OCLC, and future developments. (LRW)
Descriptors: Academic Libraries, Computer Software, Computer System Design, Copyrights

Edwards, Kirstie; Van Mele, Isabel; Verheust, Mieke; Spaepen, Arthur – Information Technology and Libraries, 1997
Three user interfaces to LIBIS, a library catalog accessible through the Internet, were evaluated for use by people who are motor impaired to identify how interface design influences the motor actions necessary to operate the system. Problems and recommendations related to simplicity, consistency, instinctiveness, interaction/feedback, and…
Descriptors: Access to Information, Comparative Analysis, Computer Interfaces, Computer Software Evaluation

Kram, Lorraine – Government Information Quarterly, 1998
Provides a starting point from which individual libraries can evaluate continuation of their depository status. Many of the basic questions that a library needs to address are explored. Issues covered include availability of government information on the Internet, costs, and incentives. Recommended specifications for public workstations in…
Descriptors: Access to Information, Computer System Design, Costs, Depository Libraries