Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Interfaces | 10 |
Computer Networks | 10 |
Users (Information) | 10 |
Information Technology | 7 |
Computer Software | 4 |
Internet | 4 |
Technological Advancement | 4 |
Computer Literacy | 3 |
Computer Security | 3 |
Models | 3 |
Multimedia Materials | 3 |
More ▼ |
Source
Computers in Libraries | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Journal of Documentation | 1 |
Journal of International… | 1 |
Library & Information Science… | 1 |
Online Libraries and… | 1 |
ProQuest LLC | 1 |
Author
Publication Type
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Practitioners | 1 |
Students | 1 |
Location
South Korea | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Colorado | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Park, Young C. – Journal of International Education Research, 2014
The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…
Descriptors: Electronic Learning, Educational Technology, Handheld Devices, Computer Networks
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology

Senkevitch, Judith J.; Wolfram, Dietmar – Library & Information Science Research, 1997
Compares the efficacy of different approaches to introducing urban adults to Internet resources. Models tested included two training period lengths and two computer interfaces (text-based and graphical). Findings suggest that the interface used does not significantly affect users' ability to find information on the Internet; user confidence in…
Descriptors: Adults, Computer Interfaces, Computer Literacy, Computer Networks
Fong, Yem S. – Online Libraries and Microcomputers, 1997
In 1996, the Colorado Library Resource Sharing and Information Access Board initiated a project to explore a patron-initiated interlibrary loan (ILL) system utilizing the ACLIN (Access Colorado Library Information Network) infrastructure and interfacing with local catalogs, remote databases, and bibliographic utilities. This report summarizes the…
Descriptors: Bibliographic Utilities, Computer Interfaces, Computer Networks, Databases

Tedd, Lucy A. – Journal of Documentation, 1995
An overview of the development of CD-ROMs is presented. Aspects covered include changes in coverage, the use of CD-ROMs in libraries and information units, changes in search interfaces and growth in end-user searching, changes in CD-ROM publishers, and hardware and networking developments. (Author)
Descriptors: Background, Computer Interfaces, Computer Networks, Information Technology
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Williamson, Mary – 1997
The QuiltSpace Builder enables Microsoft's multimedia encyclopedia "Encarta" to "fit" into an established home or institutional learning environment so that "Encarta" can be used for productive research. Early observations of the difficulties encountered by Encarta users, coupled with a survey of presently available…
Descriptors: Computer Games, Computer Interfaces, Computer Networks, Computer Software
Kibirige, Harry M. – 1996
Information has become an increasingly valuable commodity. Access to full-text information, containing text, images, and in some cases, sound, is becoming vital to decision-making for organizations as well as individuals. The book covers the following topics: (1) the information marketplace in a cyberculture; (2) the telecommunications foundation…
Descriptors: Access to Information, Computer Interfaces, Computer Literacy, Computer Mediated Communication
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers