NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Samia Shafique – ProQuest LLC, 2024
Shoeprints are a common type of evidence found at crime scenes and are regularly used in forensic investigations. However, their utility is limited by the lack of reference footwear databases that cover the large and growing number of distinct shoe models. Additionally, existing methods for matching crime-scene shoeprints to reference databases…
Descriptors: Crime, Court Litigation, Database Design, Database Management Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Liu, Ziping – Information Systems Education Journal, 2018
The case provides a realistic scenario that can be used in a systems analysis and design, accounting information systems or graduate level management information systems course. The case details the steps in the revenue and expense cycle processes of a health supply wholesale company providing students with the opportunity to map the business…
Descriptors: Systems Development, Data Processing, Health Services, Allied Health Occupations Education
Peer reviewed Peer reviewed
Direct linkDirect link
Wagner, William P.; Pant, Vik – Journal of Information Systems Education, 2010
One of the areas where demand has remained strong for MIS students is in the area of database management. Since the early days, this topic has been a mainstay in the MIS curriculum. Students of database management today typically learn about relational databases, SQL, normalization, and how to design and implement various kinds of database…
Descriptors: College Instruction, Computer Science Education, Information Technology, Business Administration Education
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Philip, George C. – Journal of Information Technology Education, 2007
This paper identifies several areas of database modeling and design that have been problematic for students and even are likely to confuse faculty. Major contributing factors are the lack of clarity and inaccuracies that persist in the presentation of some basic database concepts in textbooks. The paper analyzes the problems and discusses ways to…
Descriptors: Database Design, Databases, Teaching Methods, Misconceptions
Peer reviewed Peer reviewed
Direct linkDirect link
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Peer reviewed Peer reviewed
Manolopoulos, Yannis; Nardelli, Enrico; Papadopoulos, Apostolos; Proietti, Guido – Information Systems, 1997
Investigates the manipulation of large sets of two-dimensional data representing multiple overlapping features, and presents a new access method, the MOF-tree. Analyzes storage requirements and time with respect to window query operations involving multiple features. Examines both the pointer-based and pointerless MOF-tree representations.…
Descriptors: Computer System Design, Database Design, Database Management Systems, Information Management
Peer reviewed Peer reviewed
De Castro, Cristina; Grandi, Fabio; Scalas, Maria Rita – Information Systems, 1997
Investigates new design options for extended schema versioning support for multitemporal relational databases. Discusses the improved functionalities they may provide. Outlines options and basic motivations for the new design solutions, as well as techniques for the management of proposed schema versioning solutions, includes algorithms and…
Descriptors: Computer Oriented Programs, Computer System Design, Database Design, Database Management Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Middleton, Michael – Australian Academic & Research Libraries, 2006
An investigation of the development of Australian scientific and technological information (STI) services has been undertaken. It comprises a consideration of the characteristics and development of the services, which is the focus of this part of the paper, along with a broader examination of discipline formation in information management covered…
Descriptors: Information Services, Foreign Countries, Scientific and Technical Information, Information Management
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks