Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Access to Information | 9 |
Database Design | 9 |
Information Management | 9 |
Database Management Systems | 4 |
Archives | 3 |
Electronic Publishing | 3 |
Information Systems | 3 |
Information Technology | 3 |
Coding | 2 |
Electronic Libraries | 2 |
Foreign Countries | 2 |
More ▼ |
Source
Program: Electronic Library… | 2 |
Data Quality Campaign | 1 |
Journal of Archival… | 1 |
Journal of Information… | 1 |
Journal of Library &… | 1 |
Policy Futures in Education | 1 |
ProQuest LLC | 1 |
Author
Bergner, Terry | 1 |
Chang, Naicheng | 1 |
Charles, Jane Veronica | 1 |
Copeland, Susan | 1 |
Everitt, Sian | 1 |
Hamburger, Susan | 1 |
Harned, Catherine | 1 |
Murray, Meg Coffin | 1 |
Smith, Nancy J. | 1 |
Song, Sang Chul | 1 |
Tobias, Christine | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 4 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Delaware | 1 |
Maryland | 1 |
Michigan | 1 |
United Kingdom | 1 |
Wyoming | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tobias, Christine – Journal of Library & Information Services In Distance Learning, 2017
The Michigan State University (MSU) Libraries' Website has a case of TMI: too much information organized by librarians for librarians. Finding relevant information about various library services, including the 24/7 Distance Learning Support Line, and access points to scholarly resources is often cumbersome, and given the limited time and staffing…
Descriptors: Usability, Web Sites, Program Implementation, Library Services
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Copeland, Susan – Policy Futures in Education, 2008
Since the mid 1990s an increasing number of higher education institutions and organisations have been encouraging the production and submission of theses and dissertations in electronic format. Where access to electronic theses and dissertations is available via the Internet, usage figures indicate that this is a much consulted resource. However,…
Descriptors: Doctoral Dissertations, Journal Articles, Electronic Publishing, Access to Information
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Bergner, Terry; Smith, Nancy J. – Data Quality Campaign, 2007
Imagine if, at the start of the school year, a teacher could have detailed information about the academic history of every student in her or his classroom. This is possible if the teacher can log on to a Web site that provides access to an educational data warehouse. The teacher would see not only several years of state assessment results, but…
Descriptors: Database Design, Database Management Systems, Management Information Systems, State Programs
Chang, Naicheng – Program: Electronic Library and Information Systems, 2005
Purpose: To help to clarify the role of XML tools and standards in supporting transition and migration towards a fully XML-based environment for managing access to information. Design/methodology/approach: The Ching Digital Image Library, built on a three-tier architecture, is used as a source of examples to illustrate a number of methods of data…
Descriptors: Electronic Libraries, Visual Aids, Classification, Programming Languages
Harned, Catherine – 1989
By examining large, computer-readable databases at the federal, regional, and state level, this report addresses the degree to which data collected by the state education agencies can be used to describe the condition of rural education. The states covered in this report are Illinois, Indiana, Iowa, Michigan, Minnesota, Ohio, and Wisconsin.…
Descriptors: Access to Information, Data Collection, Database Design, Databases
Everitt, Sian – Program: Electronic Library and Information Systems, 2005
Purpose: To review a small specialist repository's strategic and opportunistic approach to utilising collaborative regional and national digital initiatives to increase access. The Birmingham Institute of Art and Design (BIAD) Archives activity is evaluated to determine whether a project-based approach recognises and meets the needs of historians,…
Descriptors: Archives, Historians, Access to Information, Library Automation
Hamburger, Susan; Charles, Jane Veronica – Journal of Archival Organization, 2006
In a desire for automated collection control, archival repositories are adopting barcoding from their library and records center colleagues. This article discusses the planning, design, and implementation phases of barcoding. The authors focus on reasons for barcoding, security benefits, in-room circulation tracking, potential for gathering…
Descriptors: Archives, Library Services, Library Automation, Facility Inventory