NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)8
Laws, Policies, & Programs
Health Insurance Portability…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 29 results Save | Export
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Huwe, Terence K. – Computers in Libraries, 2012
Given the pace of innovation, not only in the gadget market but in how social media is changing society, the future isn't what it used to be, which is to say, it is not that far off, out of reach, and "gee whiz" tomorrow. The planning horizon has moved closer than ever. And far-off eventualities are here and gone before you know it. In this…
Descriptors: Information Management, Access to Information, Information Retrieval, Usability
Hassler, Carol – Computers in Libraries, 2012
When staff at the Wisconsin State Law Library began compiling a wish list for a new website, the topic of a new domain name came up almost immediately. Their old website was located at http://wsll.state.wi.us. Spelling that relatively complex domain over the phone day after day provided the impetus to explore other options. Whatever domain name…
Descriptors: Search Engines, Computer System Design, Design Preferences, Guidelines
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Heckner, Markus; Schworm, Silke; Wolff, Christian – Journal of Educational Technology Systems, 2010
Many current (online) help systems fail because users refuse to use them or, even if they do so, they do not perceive them as helpful. There is an obvious gap between the intentions of the help content authors and the achievement of objectives concerning the perceived usefulness by help users. Problems may be divided into psychological and…
Descriptors: Feedback (Response), Prior Learning, Psychology, Internet
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Woods, Kam A. – ProQuest LLC, 2010
Over the past several decades, millions of digital objects of significant scientific, economic, cultural, and historic value have been published and distributed to libraries and archives on removable media. Providing long-term access to these documents, media files, and software executables is an increasingly complex task because of dependencies…
Descriptors: Computer Software, Research Libraries, Electronic Libraries, Archives
Lannom, Laurence – 2000
The Handle System is a distributed computer system that stores names, or handles, of digital items and can quickly resolve those names into the information necessary to locate and access the items. It was designed by the Corporation for National Research Initiatives as a general purpose global system for the reliable management of information on…
Descriptors: Access to Information, Computer System Design, Electronic Libraries, Electronic Publishing
Peer reviewed Peer reviewed
Lamont, Melissa – Journal of Academic Librarianship, 1997
Geographic information systems (GIS) are commonly misconceived as expensive and complicated map makers. Although GISs do create maps, they manipulate, organize, and display information, and aid in data documentation and accessibility. Managing GIS services involves not just hardware and software issues but managing digital data. (Author/AEF)
Descriptors: Access to Information, Computer System Design, Information Management, Information Services
Peer reviewed Peer reviewed
Lee, Dik L. – Information Processing & Management, 1995
Provides an overview of HYTREM (Hybrid Text-Retrieval Machine), a high-performance, cost-effective text-retrieval machine that handles information in large textual databases. Describes HYTREM's software and hardware design principles and presents an evaluation of system performance in relation to user demand and access versus system capacity. (JMV)
Descriptors: Access to Information, Computer System Design, Cost Effectiveness, Full Text Databases
Peer reviewed Peer reviewed
Harker, Karen R. – Library Computing, 1999
Great increases in the availability of full-text publications on the Internet has posed many problems for librarians who must secure licenses to provide the online versions of these journals to their clients. Discussion includes steps taken to minimize the impact of these problems and maximize availability of online resources, as well as the…
Descriptors: Access to Information, Computer System Design, Databases, Document Delivery
Priss, Uta; Jacob, Elin – Proceedings of the ASIS Annual Meeting, 1999
Suggests that a faceted thesaurus should be used as the basis for organizing a small-scale institutional Web site. Contends that a faceted approach to knowledge organization can make the process of organization less random and more manageable. Reports on an informal survey of three Web sites, underscoring the problems of organization that can…
Descriptors: Access to Information, Computer System Design, Evaluation Criteria, Information Management
O'Connor, Mary Ann – Document Image Automation, 1991
Discusses applications of optical technology, especially CD-ROMs, to information management needs. Information retrieval problems are discussed; design questions that concern the format of the data, indexing methods, and retrieval capabilities are presented; the need for updates is considered; access requirements are discussed; and the importance…
Descriptors: Access to Information, Computer System Design, Design Requirements, Indexing
Gleason, Bernard W. – 1991
Focusing on the need for information systems that provide faculty, staff, and students with open access to all necessary information resources, this paper begins by discussing the issues involved in developing such systems. A review of the traditional environment looks at the traditional centralized resources versus the current trend toward…
Descriptors: Access to Information, Administrators, College Faculty, College Students
Previous Page | Next Page ยป
Pages: 1  |  2