NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)9
Laws, Policies, & Programs
Health Insurance Portability…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Namdev Dhamdhere, Sangeeta – Turkish Online Journal of Distance Education, 2015
Every academic institution contributes to knowledge. The generated information and knowledge is to be compiled at a central place and disseminated among the society for further growth. It is observed that the generated knowledge in the academic institute is not stored or captured properly. It is also observed that many a times generated…
Descriptors: Foreign Countries, Knowledge Management, Higher Education, Universities
Yu, Pulan – ProQuest LLC, 2012
Classification, clustering and association mining are major tasks of data mining and have been widely used for knowledge discovery. Associative classification mining, the combination of both association rule mining and classification, has emerged as an indispensable way to support decision making and scientific research. In particular, it offers a…
Descriptors: Databases, Classification, Data Collection, Chemistry
Velez, Olivia – ProQuest LLC, 2011
Midwives in Ghana provide the majority of rural primary and maternal healthcare services, but have limited access to data for decision making and knowledge work. Few mobile health (mHealth) applications have been designed for midwives. The study purpose was to design and test an mHealth application (mClinic) that can improve data access and reduce…
Descriptors: Family Planning, Participant Observation, Self Efficacy, Testing
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Kumar, Sanjeev – ProQuest LLC, 2009
Information Technology has brought significant benefits to organizations by allowing greater information sharing within and across firm boundaries leading to performance improvements. Emerging technologies such as Service Oriented Architecture (SOA) and Web2.0 have transformed the volume and process of information sharing. However, a comprehensive…
Descriptors: Organizational Effectiveness, Information Technology, Decision Making, Business
Peer reviewed Peer reviewed
Norton, M. Jay – Library Trends, 1999
Knowledge discovery in databases (KDD) revolves around the investigation and creation of knowledge, processes, algorithms, and mechanisms for retrieving knowledge from data collections. The article is an introductory overview of KDD. The rationale and environment of its development and applications are discussed. Issues related to database design…
Descriptors: Access to Information, Automation, Bibliographic Databases, Classification
Hoover, Ronald G. – CAUSE/EFFECT, 1990
Data management challenges at the Pennsylvania State University are discussed, including providing user access to data, developing a classification system for data elements, eliminating the manual process for creating tailored user views, and developing data dictionary user enhancements. Solutions are provided to give insight into problem solving.…
Descriptors: Access to Information, Case Studies, Classification, Database Management Systems
Peer reviewed Peer reviewed
Sutton, Stuart A. – Reference Librarian, 1996
Explores the future of reference librarianship within the context of the enabling technologies that will chart library development in the 21st century. The article types libraries into categories of "traditional,""automated,""hybrid," and "digital." The typology delineates shifts in human/machine…
Descriptors: Access to Information, Classification, Futures (of Society), Information Technology
OECD Publishing (NJ1), 2006
Public bodies hold a range of information and content ranging from demographic, economic and meteorological data to art works, historical documents and books. Given the availability of information and communication technologies (ICTs) public sector information can play an important role in producing innovative value-added services and goods.…
Descriptors: Public Sector, Information Sources, Access to Information, Information Utilization
Peer reviewed Peer reviewed
Direct linkDirect link
Chang, Naicheng – Program: Electronic Library and Information Systems, 2005
Purpose: To help to clarify the role of XML tools and standards in supporting transition and migration towards a fully XML-based environment for managing access to information. Design/methodology/approach: The Ching Digital Image Library, built on a three-tier architecture, is used as a source of examples to illustrate a number of methods of data…
Descriptors: Electronic Libraries, Visual Aids, Classification, Programming Languages
Peer reviewed Peer reviewed
Sandberg-Fox, Ann; Byrum, John D. – Library Resources & Technical Services, 1998
In addition to setting out the process by which the International Standard Bibliographic Description for Computer Files [ISBD(CF)] was revised and the policies incorporated in the ISBD for Electronic Resources [ISBD(ER)], a detailed indication is provided of the stipulations of the ISBD(ER). Includes implications for AACR2R. (AEF)
Descriptors: Access to Information, Bibliographic Records, Cataloging, Classification
Cochrane, Pauline Atherton, Ed.; Johnson, Eric H., Ed. – 1998
This proceedings represents and documents in part the 16 presentations made at the 34th Annual Clinic on Library Applications of Data Processing. World Wide Web URLs that provide insight into each presentation are included. Presentations include: (1) "Hypostatizing Data Collections, Especially Bibliographic: Abstractions, Representations,…
Descriptors: Access to Information, Cataloging, Classification, Data Processing
Tillman, Mike – 1998
This paper synthesizes issues related to the Internet, Internet curriculum materials (i.e., any type of teaching material or activity that can be incorporated into the K-12 curriculum and is available on the Internet), and constructivist learning theory; it explores the use of the Internet as a constructivist environment for learning and the…
Descriptors: Access to Information, Classification, Computer Assisted Instruction, Computer Mediated Communication
Previous Page | Next Page ยป
Pages: 1  |  2