Publication Date
| In 2026 | 1 |
| Since 2025 | 739 |
| Since 2022 (last 5 years) | 3589 |
| Since 2017 (last 10 years) | 7455 |
| Since 2007 (last 20 years) | 15039 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 2852 |
| Teachers | 2010 |
| Researchers | 608 |
| Administrators | 473 |
| Media Staff | 268 |
| Students | 245 |
| Policymakers | 202 |
| Parents | 78 |
| Counselors | 33 |
| Support Staff | 22 |
| Community | 21 |
| More ▼ | |
Location
| Australia | 499 |
| Turkey | 474 |
| United Kingdom | 474 |
| Canada | 364 |
| China | 309 |
| Taiwan | 248 |
| United States | 228 |
| Indonesia | 223 |
| Spain | 221 |
| California | 195 |
| Germany | 163 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 11 |
| Meets WWC Standards with or without Reservations | 16 |
| Does not meet standards | 17 |
Strikwerda, Robert A.; Ross, John Minor – Collegiate Microcomputer, 1992
Analyzes some of the ethical issues relating to the illegal use of computer software and presents empirical evidence suggesting the nature and scope of the problem. Types of software are explained, including freeware and shareware; the current ethical and legal situation is described; a moral analysis is discussed; problems of rationalization are…
Descriptors: Computer Software, Ethics, Higher Education, Legal Responsibility
Peer reviewedHieb, Barry R. – Journal of Dental Education, 1991
Considered are aspects of effective dental automation, including integrating "islands of computing"; definition of a dental record; common nomenclature; an enabling architecture; capturing data at its source; computer-assisted software engineering; and system security. (DB)
Descriptors: Automation, Computer Software, Computers, Dentistry
Peer reviewedHorton, Forest Woody, Jr. – Electronic Library, 1991
Describes infomapping, or the mapping of corporate information assets, as a method to manage information as an organizational resource. Attributes of Information Resource Entities (IREs), which are profiled in an information map, are described; management benefits are discussed; and the use of InfoMapper, a software tool for information mapping,…
Descriptors: Computer Software, Databases, Information Management, Information Systems
Peer reviewedMarmion, Dan – Library Software Review, 1990
Discusses the early history and current proliferation of computer viruses that occur on Macintosh and DOS personal computers, mentions virus detection programs, and offers suggestions for how libraries can protect themselves and their users from damage by computer viruses. (LRW)
Descriptors: Computer Software, Electronic Mail, Library Equipment, Library Materials
Steffey, Ramona J. – Online, 1990
The third of three articles on the NOTIS interface to locally mounted database tapes looks at the experience of the Vanderbilt University library. Topics include the system control file, master functions, database functions, terminal functions that regulate access, database maintenance, impact on the local computer system, and report features.…
Descriptors: Academic Libraries, Computer Software, Databases, Higher Education
Marcus, Stephen – Writing Notebook: Creative Word Processing in the Classroom, 1991
Focuses on design issues of HyperCard and introduces a variety of design-related topics to raise issues and to point to resources. (MG)
Descriptors: Computer Software, Computer Uses in Education, Higher Education, Hypermedia
Chen, Ching-chih – Microcomputers for Information Management, 1991
Describes compact disc interactive (CD-I) as a multimedia home entertainment system that combines audio, visual, text, graphic, and interactive capabilities. Full-screen video and full-motion video (FMV) are explained, hardware for FMV decoding is described, software is briefly discussed, and CD-I titles planned for future production are listed.…
Descriptors: Computer Software, Futures (of Society), Microcomputers, Optical Data Disks
Peer reviewedAlexander, Melody Webler – Office Systems Research Journal, 1993
Participants (n=130) who had completed training in WordPerfect, Lotus 1-2-3, and dBase III+ completed a questionnaire related to demographic characteristics and factors that influence training participation. Trainees are participating in computer training for personal reasons, seeking convenient time, location, and length. Child care or…
Descriptors: Adult Education, Computer Software, Influences, Participant Characteristics
Pearson, LaTresa – Training, 1993
CD-ROM training applications are becoming more appealing as systems develop faster response time, are able to play full-screen full-motion video, have better courseware, and solve problems with incompatible platforms. (SK)
Descriptors: Computer Software, Educational Technology, Instructional Effectiveness, Optical Disks
Peer reviewedMorse, David T. – Educational and Psychological Measurement, 1998
Describes MINSIZE, an MS-DOS computer program that permits the user to determine the minimum sample size needed for the results of a given analysis to be statistically significant. Program applications for statistical significance tests are presented and illustrated. (SLD)
Descriptors: Computer Software, Effect Size, Sample Size, Sampling
Peer reviewedCaplan, Priscilla – Public-Access Computer Systems Review, 1998
Explains digital object identifier (DOI) which was developed to facilitate digital commerce by maintaining persistent links to the rights holder of a digital object. Topics include uniform resource locators (URLs); uniform resource names (URNs); and Handle System software. (Author/LRW)
Descriptors: Computer Software, Online Systems, Technological Advancement, World Wide Web
Day, C. William – American School & University, 1999
Examines the planning process to identify equipment or systems within an educational facility that could be Y2K sensitive. Discusses developing a contingency plan to prevent operational shutdown. Concluding comments describe a simple Y2K equipment-testing procedure. (GR)
Descriptors: Computer Software, Educational Facilities, Equipment Evaluation, Planning
Peer reviewedFalk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Stamps, David – Training, 1999
Discusses the emerging trend of customized enterprise training software delivered via the Web. Highlights opinions of vendors and customers as to whether it will be a cost-effective corporate training process. (SK)
Descriptors: Computer Software, Corporate Education, Distance Education, World Wide Web
Moonen, Jef – Educational Technology, 2000
Discusses the change in learning materials to digital formats and considers whether current design and production methods for educational software are still appropriate or if there is a need for a new design and production strategy. Describes structural versus associative design strategies and a new three-space strategy. (LRW)
Descriptors: Computer Assisted Instruction, Computer Software Development, Courseware, Instructional Materials


