Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 98 |
Descriptor
Internet | 274 |
Databases | 211 |
Access to Information | 60 |
Higher Education | 52 |
Computer Software | 42 |
Web Sites | 41 |
Online Searching | 37 |
World Wide Web | 37 |
Online Systems | 36 |
Information Technology | 35 |
Electronic Libraries | 32 |
More ▼ |
Source
Author
Allen, Frank H. | 3 |
Battle, Gary M. | 3 |
Ferrence, Gregory M. | 3 |
Safford, Barbara Ripp | 3 |
Tenopir, Carol | 3 |
Breeding, Marshall | 2 |
Brisco, Shonda | 2 |
Descy, Don E. | 2 |
Hyde, Hartley | 2 |
Mitri, Michel | 2 |
Oppenheim, Charles | 2 |
More ▼ |
Publication Type
Education Level
Higher Education | 60 |
Postsecondary Education | 18 |
Elementary Secondary Education | 9 |
Adult Education | 7 |
High Schools | 3 |
Elementary Education | 2 |
Secondary Education | 2 |
Two Year Colleges | 1 |
Location
Canada | 8 |
United States | 6 |
United Kingdom | 5 |
Florida | 4 |
Germany | 4 |
Maryland | 4 |
Oregon | 3 |
Australia | 2 |
California | 2 |
Colorado | 2 |
European Union | 2 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Equal Access | 1 |
Family Educational Rights and… | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Dunn, Paul; Miller, Robert E. – Journal of Information Systems Education, 2022
This teaching case describes the functionality of a system employing IoT sensors to monitor part levels for a fictitious auto parts manufacturer. Data from the sensors are used to populate a centralized database and generate a dashboard for management. The system also generates tiered alerts to notify part runners and managers of pending part…
Descriptors: Database Design, Data Analysis, Manufacturing, Internet
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Lawrence, Ellen – Knowledge Quest, 2014
With the influx of technology, school library programs started to adapt traditional services by embracing new innovative resources. However, even with online research databases and cloud computing, most school libraries still occupy a fixed physical space in the school, a destination for students and teachers when they need help with reading or…
Descriptors: Librarians, School Libraries, School Districts, Databases
Tomaszewski, Robert – Journal of Chemical Education, 2016
Critical thinking and analytical problem-solving skills in research involves using different search strategies. A proposed concept for an "Imploded Boolean Search" combines three unique identifiable field types to perform a search: keyword(s), numerical value(s), and a chemical structure or reaction. The object of this type of search is…
Descriptors: Undergraduate Study, College Science, Chemistry, Case Studies
Yagci, Mustafa; Ünal, Menderes – Online Submission, 2014
A design and application of adaptive online exam system are carried out in this paper. Adaptive exam systems determine different question sets automatically and interactively for each student and measure their competence on a certain area of discipline instead of comparing their gains with each other. Through an adaptive exam technique, a…
Descriptors: Adaptive Testing, Expertise, Information Security, Databases
Jaffarian, Michael – Research-publishing.net, 2014
This chapter consists of a short history of the impact of computer technology on Christian evangelical mission research from the 1970's to the present. The trail winds through World Vision, MARC, the "World Christian Encyclopedia," "Operation World," SIL, OC International, DAWN, Global Mapping International, the AD2000 and…
Descriptors: Influence of Technology, Computer Uses in Education, Christianity, Religious Education
Mitri, Michel – Journal of Information Systems Education, 2012
XML has become the most ubiquitous format for exchange of data between applications running on the Internet. Most Web Services provide their information to clients in the form of XML. The ability to process complex XML documents in order to extract relevant information is becoming as important a skill for IS students to master as querying…
Descriptors: Computer Science Education, Databases, Internet, College Curriculum
Vitevitch, Michael S.; Stamer, Melissa K.; Kieweg, Douglas – Second Language Research, 2012
A number of resources provide psycholinguistic researchers with information about the words that the typical child or adult knows in a variety of languages. What is currently not available is a resource that provides information about the words that a typical adult learning a foreign language knows. We created such a resource for Spanish: The…
Descriptors: Second Language Learning, Adult Learning, Vocabulary Development, Spanish
Govorov, Michael; Gienko, Gennady – International Research in Geographical and Environmental Education, 2013
Content development and maintenance of geographic information systems (GIS) related courses, especially designed for distance and online delivery, could be a tedious task even for an experienced instructor. The paper outlines application of abstract instructional design techniques for modeling course structure and developing corresponding course…
Descriptors: Instructional Design, Internet, Course Content, Geographic Information Systems
Miller, Louise – American Journal of Business Education, 2012
This paper describes a student project assignment used in an accounting information systems course. We are now truly immersed in the internet age, and while many required accounting information systems courses and textbooks introduce database design, accounting software development, cloud computing, and internet security, projects involving the…
Descriptors: Accounting, Information Systems, Internet, Database Management Systems
Shivers, Cassandra – Computers in Libraries, 2012
The author, a digital access architect in the information systems department of the Orange County Library System in Florida, was given the challenge of creating a library mobile app around the 2009 holiday season. At that time, Sheri Chambers, digital content manager in the information systems department, and Debbie Moss, assistant director of the…
Descriptors: Information Systems, Libraries, Library Networks, Internet
Hastings, Robin – Computers in Libraries, 2012
Backups are a modern fact of life. Every organization that has any kind of computing technology (and that is all of them these days) needs to back up its data in case of technological or user errors. Traditionally, large-scale backups have been done via an internal or external tape drive that takes magnetic tapes (minicassettes, essentially) and…
Descriptors: Internet, Computer Storage Devices, Information Storage, Computer Software Evaluation
Martin, David – Principal, 2011
This article features Doing What Works (DWW), the largest, most comprehensive, and most insightful repository of effective, research-based instructional practices and other resources currently available to educators. It is a principal's free ticket to accessing an abundance of research-based best practices and school improvement. DWW covers a wide…
Descriptors: Educational Methods, Principals, Access to Information, Administrator Role
Battle, Gary M.; Allen, Frank H.; Ferrence, Gregory M. – Journal of Chemical Education, 2011
Parts 1 and 2 of this series described the educational value of experimental three-dimensional (3D) chemical structures determined by X-ray crystallography and retrieved from the crystallographic databases. In part 1, we described the information content of the Cambridge Structural Database (CSD) and discussed a representative teaching subset of…
Descriptors: Relevance (Education), Chemistry, Learning Modules, Databases
Hart, Amy – Library Media Connection, 2010
Resource Description and Access (RDA) represents both a revised set of cataloging rules and a completely new framework in which to catalog. It aims for backward compatibility with AACR2 at the same time that it seeks to facilitate moving library data to the Semantic Web. Given these competing goals, it's not surprising that RDA's implementation…
Descriptors: Libraries, Bibliographic Databases, Cataloging, Internet