Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 13 |
Descriptor
Access to Information | 50 |
Information Retrieval | 50 |
Information Storage | 48 |
Electronic Publishing | 11 |
Higher Education | 11 |
Information Technology | 11 |
Online Searching | 11 |
Archives | 9 |
Internet | 9 |
Information Management | 8 |
Preservation | 8 |
More ▼ |
Source
Author
Amthor, Geoff | 1 |
Antonucci, Robert | 1 |
Aoe, Jun-ichi | 1 |
Barkley, Daniel | 1 |
Besser, Howard | 1 |
Beulens, Adrie | 1 |
Blake, Ruth | 1 |
Burton, Adrian P. | 1 |
Chang, Shih-Fu | 1 |
Chowdhury, G. G. | 1 |
Ciampa, Mark | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 8 |
Postsecondary Education | 3 |
Elementary Secondary Education | 2 |
Adult Education | 1 |
Location
United States | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Canada | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Federated States of Micronesia | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Yadav, Sourabh; Sharma, Nonita; Mangla, Monika; Mahajan, Asmita – Journal of Educational Multimedia and Hypermedia, 2021
The manuscript proposes a method based on Blockchain technology, IPFS, and asymmetric key algorithm to authenticate academic degrees and certificates. The proposed method employs decentralization and therefore provides a scalable, secure, transparent, and economical solution than existing methods. In the proposed framework, the degrees and…
Descriptors: Information Storage, Monetary Systems, Student Records, Information Security
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Yalniz, Ismet Zeki – ProQuest LLC, 2014
Millions of books from public libraries and private collections have been scanned by various organizations in the last decade. The motivation is to preserve the written human heritage in electronic format for durable storage and efficient access. The information buried in these large book collections has always been of major interest for scholars…
Descriptors: Books, Electronic Libraries, Library Materials, Electronic Equipment
Cohen, Anat; Reisman, Sorel; Sperling, Barbra Bied – International Review of Research in Open and Distributed Learning, 2015
Learning object repositories are a shared, open and public space; however, the possibility and ability of personal expression in an open, global, public space is crucial. The aim of this study is to explore personal spaces in a big learning object repository as a facilitator for adoption of Open Educational Resources (OER) into teaching practices…
Descriptors: Resource Units, Shared Resources and Services, Access to Information, Information Storage
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
Schaffhauser, Dian – Campus Technology, 2010
Even in the age of Google, digital repositories can add tremendous value to an institution. Yet creating and maintaining these collections is no small task. Digital repository advocates will concede that the challenges in building and maintaining these collections can daunt even the most intrepid supporters. Three repository directors share their…
Descriptors: Higher Education, Electronic Libraries, Information Storage, Knowledge Management
Frederick, Francie A.; Hankins, Rhonda – Association of Governing Boards of Universities and Colleges, 2007
Gathering and displaying governance documents and photos online can help educate the public, promote transparency, and preserve historical artifacts. Under the leadership of a board chair with lifelong interest in history and respect for the historical record, the Office of the Board of Regents of the University of Texas System has discovered that…
Descriptors: Universities, Governing Boards, History, Information Retrieval

Pierre, Samuel; Safa, Haidar – Telematics and Informatics, 1996
Presents two storage models and several other associated models for the presentation of multimedia documents. Analysis of these models reveals their capacity to synchronize various temporal scenarios while allowing users simultaneous and secure access to multimedia systems. Discusses theoretical foundations, information processing, multimedia…
Descriptors: Access to Information, Computer Storage Devices, Information Management, Information Processing
Dunlap, Isaac Hunter – Policy Futures in Education, 2008
Not since the age of Gutenberg has an information upheaval so thoroughly disrupted the processes of scholarly knowledge creation, management and preservation as the digital revolution currently under way. Academic libraries have traditionally been structured to effectively facilitate the access, use and storage of mostly static, print-based…
Descriptors: Research Libraries, Academic Libraries, Library Role, Information Dissemination
Grafstein, Ann – portal: Libraries and the Academy, 2007
The literature on information literacy often assumes that there is an inherent link between the need for information literacy and what is commonly referred to as the information explosion. This assumed link is reflected in programs of information literacy instruction offered by academic libraries. This article argues that the basic concepts of…
Descriptors: Academic Libraries, Information Technology, Information Literacy, Library Role

Shishibori, Masami; Koyama, Masafumi; Okada, Makoto; Aoe, Jun-ichi – Information Processing & Management, 2000
Discusses information retrieval and the use of binary trees as a fast access method for search strategies such as hashing. Proposes new methods based on compact binary trees that provide faster access and more compact storage, explains the theoretical basis, and confirms the validity of the methods through empirical observations. (LRW)
Descriptors: Access to Information, Algorithms, Information Retrieval, Information Storage
Mitchell, W. Bede – Journal of Access Services, 2007
S. R. Ranganathan's five laws of library science, originally published in 1931, provide the basis for reflections on current trends in academic libraries.
Descriptors: Academic Libraries, Library Science, Time Perspective, Reflection
Amthor, Geoff – Multimedia Today, 1995
Discussion of digital media focuses on IBM's Digital Library which integrates information storage, management, search, retrieval, and distribution technologies to help content owners provide easy access while protecting and preserving materials. Highlights include capturing digital data, and examples of the use of Digital Library at two…
Descriptors: Access to Information, Computer Software, Higher Education, Information Management
Kassahun, Ayalew; Beulens, Adrie; Hartog, Rob – Educational Technology & Society, 2006
Two major trends in eLearning are the shift from presentational towards activating learning objects and the shift from proprietary towards SCORM conformant delivery systems. In a large program on the design, development and use of digital learning material for food and biotechnology in higher education, a large amount of experience has been gained…
Descriptors: Educational Trends, Electronic Learning, Management Systems, Resource Units