{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:47:16Z","timestamp":1730278036095,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/ithet.2012.6246041","type":"proceedings-article","created":{"date-parts":[[2012,7,31]],"date-time":"2012-07-31T17:50:46Z","timestamp":1343757046000},"page":"1-4","source":"Crossref","is-referenced-by-count":6,"title":["Using web conference system during the lessons in higher education"],"prefix":"10.1109","author":[{"given":"Gabor","family":"Kiss","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/34.1-2.28"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1177\/001316447303300111"},{"key":"11","first-page":"278","author":"levene","year":"1960","journal-title":"Robust Tests for Equality of Variances"},{"year":"0","key":"12"},{"key":"3","first-page":"31","article-title":"Wie kann man die Steganographie und Kryptographie bekannt machen?","author":"kiss","year":"2005","journal-title":"Informatik und Schule Infos 2005"},{"key":"2","first-page":"71","article-title":"Analyse der Studienleistungen von Studierenden an der Universita?t O?buda und deren Implikationen fu?r die Infomatikausbildung","volume":"4","author":"kiss","year":"2010","journal-title":"Commentarii Informaticae Didacticae (CID)"},{"key":"1","first-page":"556","article-title":"The Analysing of the Computer Science Learning Habits in the First Year on the Budapest Tech","author":"kiss","year":"2009","journal-title":"4th Aspects and Visions of Applied Economics and Informatics"},{"year":"0","key":"10"},{"journal-title":"Educating the Net Generation","year":"2005","author":"oblinger","key":"7"},{"key":"6","article-title":"How Americans are expanding their use of the Internet","author":"victory","year":"2002","journal-title":"A Nation Online"},{"key":"5","first-page":"419","article-title":"Experiences in teaching data concealment and data encryption to engineering undergraduates","author":"kiss","year":"0","journal-title":"9th IEEE International Conference on Information Technology Based Higher Education and Training (ITHET 2010)"},{"key":"4","first-page":"133","article-title":"Analysing the relationship between students' paper results and flash based logical problem solving in the course Introduction to Informatics","volume":"1","author":"kiss","year":"2010","journal-title":"O?buda University E-Bulletin"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2012.6250023"},{"year":"0","key":"8"}],"event":{"name":"2012 11th International Conference on Information Technology Based Higher Education and Training (ITHET)","start":{"date-parts":[[2012,6,21]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2012,6,23]]}},"container-title":["2012 International Conference on Information Technology Based Higher Education and Training (ITHET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6238099\/6245999\/06246041.pdf?arnumber=6246041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:23:45Z","timestamp":1490117025000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6246041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ithet.2012.6246041","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}