Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 17 |
Descriptor
Information Retrieval | 244 |
Information Storage | 232 |
Databases | 78 |
Information Systems | 55 |
Online Systems | 45 |
Microcomputers | 39 |
Higher Education | 37 |
Computer Software | 35 |
Search Strategies | 31 |
Computer Storage Devices | 28 |
Access to Information | 27 |
More ▼ |
Source
Author
Sonnemann, Sabine S. | 3 |
Chen, Ching-chih | 2 |
Falk, Howard | 2 |
Hunter, Beverly | 2 |
Price, Joseph W. | 2 |
Pruett, Nancy Jones | 2 |
Abel, Marie-Helene | 1 |
Adams, Michael Q. | 1 |
Alabi, G. A. | 1 |
Alexander, Michael | 1 |
Ali, S. Nazim | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 10 |
Elementary Secondary Education | 4 |
Postsecondary Education | 4 |
Location
Canada | 4 |
Nigeria | 2 |
Texas | 2 |
Austria (Vienna) | 1 |
Ethiopia | 1 |
Florida | 1 |
France | 1 |
Germany | 1 |
India | 1 |
Indiana | 1 |
Nebraska | 1 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Dogucu, Mine; Çetinkaya-Rundel, Mine – Journal of Statistics and Data Science Education, 2022
It is recommended that teacher-scholars of data science adopt reproducible workflows in their research as scholars and teach reproducible workflows to their students. In this article, we propose a third dimension to reproducibility practices and recommend that regardless of whether they teach reproducibility in their courses or not, data science…
Descriptors: Statistics Education, Data Science, Teaching Methods, Instructional Materials
Yadav, Sourabh; Sharma, Nonita; Mangla, Monika; Mahajan, Asmita – Journal of Educational Multimedia and Hypermedia, 2021
The manuscript proposes a method based on Blockchain technology, IPFS, and asymmetric key algorithm to authenticate academic degrees and certificates. The proposed method employs decentralization and therefore provides a scalable, secure, transparent, and economical solution than existing methods. In the proposed framework, the degrees and…
Descriptors: Information Storage, Monetary Systems, Student Records, Information Security
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Silver, Mark S. – American Journal of Business Education, 2017
During the current period of rapid technological change, business students need to emerge from their introductory course in Information Systems (IS) with a set of fundamental principles to help them "think about Information Technology (IT)" in future courses and the workplace. Given the digital revolution, they also need to appreciate…
Descriptors: Information Systems, Information Technology, Information Storage, Information Retrieval
Ullrich, Carsten – International Association for Development of the Information Society, 2016
An ontology expresses a common understanding of a domain that serves as a basis of communication between people or systems, and enables knowledge sharing, reuse of domain knowledge, reasoning and thus problem solving. In Technology-Enhanced Learning, especially in Intelligent Tutoring Systems and Adaptive Learning Environments, ontologies serve as…
Descriptors: Workplace Learning, Manufacturing Industry, Industrial Training, Models
Paulus, Trena M.; Lester, Jessica Nina – International Journal of Social Research Methodology, 2016
The use of computer-assisted qualitative data analysis software (CAQDAS) has not been without controversy, with a pervasive sense of skepticism and resistance towards its adoption by many scholars. Language-based researchers in particular, such as conversation and discourse analysts, have been slow to embrace such tools for their work. In this…
Descriptors: Discourse Analysis, Computer Software, Task Analysis, Transcripts (Written Records)
Korzaan, Melinda; Lawrence, Cameron – Information Systems Education Journal, 2016
This lab exercise exposes students to Evernote, which is a powerful productivity application that has gained significant purchase in professional work environments. In many academic settings the introductory computer applications course has a specific focus on standard productivity applications such as MS Word and MS Excel. While ensuring fluency…
Descriptors: Productivity, Computer Oriented Programs, Introductory Courses, Computer Science Education
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Schaffhauser, Dian – Campus Technology, 2010
Even in the age of Google, digital repositories can add tremendous value to an institution. Yet creating and maintaining these collections is no small task. Digital repository advocates will concede that the challenges in building and maintaining these collections can daunt even the most intrepid supporters. Three repository directors share their…
Descriptors: Higher Education, Electronic Libraries, Information Storage, Knowledge Management
Swanson, Leonard C. – Council of Chief State School Officers, 2010
This document provides recommendations for request for proposal (RFP) and contract language that state education agencies can use to specify their requirements for access to test item banks. An item bank is a repository for test items and data about those items. Item banks are used by state agency staff to view items and associated data; to…
Descriptors: State Departments of Education, Test Items, Item Banks, Program Proposals

Perry, Joanne M. – Special Libraries, 1982
Discusses the superiority of vertical filing of maps in compressor-style vertical units over horizontal filing in drawers, emphasizing such factors as physical protection of the collection, ease of filing and retrieval, and efficient use of space. Disadvantages of vertical filing are also reviewed. (Author/JL)
Descriptors: Information Retrieval, Information Storage, Library Collections, Library Equipment

Saran, M.; And Others – Information Processing and Management, 1981
Describes a dialog-program which uses basic statements available on a WANG 2200T version connected to a floppy-diskette to cross-reference a given set of keywords, author names, journal names, and specified reference numbers. Special program features are described and two references are listed. (Author/RBF)
Descriptors: Computer Programs, Computer Storage Devices, Computers, Information Retrieval
Bovee, Donna – Optical Information Systems, 1990
Discusses digital imaging technology and examines document database conversion considerations. Two types of document imaging systems are described: (1) a work in process system, and (2) a storage and retrieval system. Conversion methodology is outlined, and a document conversion scenario is presented as a practical guide to conversion. (LRW)
Descriptors: Computer Storage Devices, Databases, Documentation, Information Retrieval
Herther, Nancy K. – Online, 1985
Introduction to use of compact disk technology for storing digital data highlights history, background, and developments; technical features; standardization issues; current CD ROM applications; and the market for CD products. A production diagram, a sampling of CD manufacturers and disk replicators, and performance comparison of three storage…
Descriptors: Computer Storage Devices, Information Retrieval, Information Storage, Information Systems