Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Access to Information | 4 |
Coding | 4 |
Metadata | 4 |
Programming | 4 |
Information Management | 3 |
Internet | 2 |
Bibliographic Databases | 1 |
Catalogs | 1 |
Classification | 1 |
Communication (Thought… | 1 |
Computer Interfaces | 1 |
More ▼ |
Author
Adam M. Nguyen | 1 |
Amin, Rohan Mahesh | 1 |
Anastasia Ramig | 1 |
Avery M. Fernandez | 1 |
Cyrus Gomes | 1 |
Horng, Huai-Chien | 1 |
Kevin W. Walker | 1 |
Lance Simpson | 1 |
Michael T. Moen | 1 |
Ohler, Jason | 1 |
Vincent F. Scalfani | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Alabama | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vincent F. Scalfani; Kevin W. Walker; Lance Simpson; Avery M. Fernandez; Vishank D. Patel; Anastasia Ramig; Cyrus Gomes; Michael T. Moen; Adam M. Nguyen – Issues in Science and Technology Librarianship, 2023
Scholarly web-based application programming interfaces (APIs) allow users to interact with information and data programmatically. Interacting with information programmatically allows users to create advanced information query workflows and quickly access machine-readable data for downstream computations. With the growing availability of scholarly…
Descriptors: Access to Information, Bibliographic Databases, Library Services, Electronic Libraries
Ohler, Jason – Learning & Leading with Technology, 2010
The Information Age has been built, in part, on the belief that more information is always better. True to that sentiment, people have found ways to make a lot of information available to the masses--perhaps more than anyone ever imagined. The goal of the Semantic Web, often called Web 3.0, is for users to spend less time looking for information…
Descriptors: Internet, Technological Advancement, Mass Media, Information Dissemination
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Yang, Jin Tan; Horng, Huai-Chien – International Journal of Distance Education Technologies, 2006
This paper proposes a design framework for constructing Digital Rights Management (DRM) that enables learning objects in legal usage. The central theme of this framework is that any design of a DRM must have theories as foundations to make the maintenance, extension or interoperability easy. While a learning objective consists of learning…
Descriptors: Design, Legal Responsibility, Resource Units, Metadata