Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Access to Information | 4 |
Computer Science | 4 |
Information Management | 4 |
Metadata | 4 |
Information Technology | 3 |
Business | 2 |
Classification | 2 |
Comparative Analysis | 2 |
Computer Mediated… | 2 |
Computer Networks | 2 |
Computer Science Education | 2 |
More ▼ |
Publication Type
Dissertations/Theses -… | 2 |
Collected Works - Proceedings | 1 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dragut, Eduard Constantin – ProQuest LLC, 2010
An increasing number of Web sites expose their content via query interfaces, many of them offering the same type of products/services (e.g., flight tickets, car rental/purchasing). They constitute the so-called "Deep Web". Accessing the content on the Deep Web has been a long-standing challenge for the database community. For a user interested in…
Descriptors: Internet, Web Sites, Search Engines, Information Retrieval
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Burnett, Kathleen; Ng, Kwong Bor; Park, Soyeon – Journal of the American Society for Information Science, 1999
Describes different conceptual foundations and orientations of the two major approaches to metadata: bibliographic-control approach (origins and major proponents in library science); and data-management approach (origins and major proponents in computer science). Examination of efforts to establish metadata standards and comparison of different…
Descriptors: Access to Information, Cataloging, Comparative Analysis, Computer Science
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers