NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)4
Since 2006 (last 20 years)12
Audience
Practitioners1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Neves, Daniel Eugênio; Brandão, Wladmir Cardoso; Ishitani, Lucila – Informatics in Education, 2017
Although widely used, the SCORM metadata model for content aggregation is difficult to be used by educators, content developers and instructional designers. Particularly, the identification of contents related with each other, in large repositories, and their aggregation using metadata as defined in SCORM, has been demanding efforts of computer…
Descriptors: Metadata, Information Storage, Information Management, Information Retrieval
Massey, Charlotte – ProQuest LLC, 2017
Retrieving files from one's computer is done daily and is an essential part of completing most tasks at work, yet surprisingly little research has examined the ways that people structure and organize their files. Management of personal digital information is a challenging task that users approach idiosyncratically. Large individual differences…
Descriptors: Information Retrieval, Information Storage, Electronic Libraries, Psychological Patterns
Peer reviewed Peer reviewed
Direct linkDirect link
Paulus, Trena M.; Lester, Jessica Nina – International Journal of Social Research Methodology, 2016
The use of computer-assisted qualitative data analysis software (CAQDAS) has not been without controversy, with a pervasive sense of skepticism and resistance towards its adoption by many scholars. Language-based researchers in particular, such as conversation and discourse analysts, have been slow to embrace such tools for their work. In this…
Descriptors: Discourse Analysis, Computer Software, Task Analysis, Transcripts (Written Records)
Aladjem, Ruthi; Hardof, Sharon – International Association for Development of the Information Society, 2016
Personal information management (PIM) is a research field that examines the activities by which users save, organize and retrieve personal information items. PIM is a one of the essential new literacies for learners in the 21st century. This paper reports results from a pilot study that explored PIM practices and strategies of K-12 students, on…
Descriptors: Elementary Secondary Education, Elementary School Students, Secondary School Students, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Goben, Abigail; Raszewski, Rebecca – Issues in Science and Technology Librarianship, 2015
As data as a scholarly object continues to grow in importance in the research community, librarians are undertaking increasing responsibilities regarding data management and curation. New library initiatives include assisting researchers in finding data sets for reuse; locating and hosting repositories for required archiving; consultations on…
Descriptors: Librarians, Information Management, Information Utilization, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Turner, Rich – Computers in Libraries, 2009
In this article, the author contends that in 10 years, federated search--or search of any kind for that matter--won't exist. He elaborates that the "function" of search will exist--but not in a context with which anyone is familiar today. So if "search" doesn't exist in 2018, how will people find the information that they need across vast volumes…
Descriptors: Information Management, Online Searching, User Needs (Information), Information Retrieval
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
Peer reviewed Peer reviewed
Haapaniemi, Peter – Electronic Library, 1990
Describes imaging technology, which allows huge numbers of words and illustrations to be reduced to tiny fraction of space required by originals and discusses current applications. Highlights include image processing system at National Archives; use by banks for high-speed check processing; engineering document management systems (EDMS); folder…
Descriptors: Archives, Banking, Computer Storage Devices, Engineering
O'Connor, Mary Ann – Document Image Automation, 1991
Describes document image management systems that are used for optical storage to facilitate information retrieval. Document image management applications are described, considerations in evaluating system features and functions are presented, and criteria for evaluating vendors of document image management systems are suggested. (two references)…
Descriptors: Computer Storage Devices, Computer System Design, Database Management Systems, Evaluation Criteria
Peer reviewed Peer reviewed
Pierre, Samuel; Safa, Haidar – Telematics and Informatics, 1996
Presents two storage models and several other associated models for the presentation of multimedia documents. Analysis of these models reveals their capacity to synchronize various temporal scenarios while allowing users simultaneous and secure access to multimedia systems. Discusses theoretical foundations, information processing, multimedia…
Descriptors: Access to Information, Computer Storage Devices, Information Management, Information Processing
Law, Margaret H.; Rosen, Bruce K. – 1989
The objectives of this project were to assist the National Archives and Records Administration (NARA) in developing a policy for the representation, transfer, access, and preservation of electronic records of permanent value. A lack of attention to the management, retention, and selective preservation of these machine-readable records will result…
Descriptors: Archives, Computer Networks, Computer Storage Devices, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Grafstein, Ann – portal: Libraries and the Academy, 2007
The literature on information literacy often assumes that there is an inherent link between the need for information literacy and what is commonly referred to as the information explosion. This assumed link is reflected in programs of information literacy instruction offered by academic libraries. This article argues that the basic concepts of…
Descriptors: Academic Libraries, Information Technology, Information Literacy, Library Role
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, W. Bede – Journal of Access Services, 2007
S. R. Ranganathan's five laws of library science, originally published in 1931, provide the basis for reflections on current trends in academic libraries.
Descriptors: Academic Libraries, Library Science, Time Perspective, Reflection
Previous Page | Next Page »
Pages: 1  |  2  |  3