Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Access to Information | 4 |
| Coding | 4 |
| Metadata | 4 |
| Programming | 4 |
| Information Management | 3 |
| Internet | 2 |
| Bibliographic Databases | 1 |
| Catalogs | 1 |
| Classification | 1 |
| Communication (Thought… | 1 |
| Computer Interfaces | 1 |
| More ▼ | |
Author
| Adam M. Nguyen | 1 |
| Amin, Rohan Mahesh | 1 |
| Anastasia Ramig | 1 |
| Avery M. Fernandez | 1 |
| Cyrus Gomes | 1 |
| Horng, Huai-Chien | 1 |
| Kevin W. Walker | 1 |
| Lance Simpson | 1 |
| Michael T. Moen | 1 |
| Ohler, Jason | 1 |
| Vincent F. Scalfani | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
Audience
Location
| Alabama | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vincent F. Scalfani; Kevin W. Walker; Lance Simpson; Avery M. Fernandez; Vishank D. Patel; Anastasia Ramig; Cyrus Gomes; Michael T. Moen; Adam M. Nguyen – Issues in Science and Technology Librarianship, 2023
Scholarly web-based application programming interfaces (APIs) allow users to interact with information and data programmatically. Interacting with information programmatically allows users to create advanced information query workflows and quickly access machine-readable data for downstream computations. With the growing availability of scholarly…
Descriptors: Access to Information, Bibliographic Databases, Library Services, Electronic Libraries
Ohler, Jason – Learning & Leading with Technology, 2010
The Information Age has been built, in part, on the belief that more information is always better. True to that sentiment, people have found ways to make a lot of information available to the masses--perhaps more than anyone ever imagined. The goal of the Semantic Web, often called Web 3.0, is for users to spend less time looking for information…
Descriptors: Internet, Technological Advancement, Mass Media, Information Dissemination
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Yang, Jin Tan; Horng, Huai-Chien – International Journal of Distance Education Technologies, 2006
This paper proposes a design framework for constructing Digital Rights Management (DRM) that enables learning objects in legal usage. The central theme of this framework is that any design of a DRM must have theories as foundations to make the maintenance, extension or interoperability easy. While a learning objective consists of learning…
Descriptors: Design, Legal Responsibility, Resource Units, Metadata

Peer reviewed
Direct link
