Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Classification | 9 |
Computer System Design | 9 |
Information Technology | 9 |
Internet | 6 |
Models | 4 |
Access to Information | 3 |
Computer Mediated… | 3 |
Computer Software | 3 |
Computer Uses in Education | 3 |
Metadata | 3 |
Artificial Intelligence | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Computers & Education | 2 |
Information Processing and… | 1 |
Journal of Documentation | 1 |
Proceedings of the ASIS… | 1 |
Theory Into Practice | 1 |
Author
AL Faresi, Ahmed | 1 |
Akar, Gozde B. | 1 |
Alexander, Bryan | 1 |
Amin, Rohan Mahesh | 1 |
Cechinel, Cristian | 1 |
Chen, Hsinchun | 1 |
Chowdhury, G. G. | 1 |
Dhar, Vasant | 1 |
Garcia-Barriocanal, Elena | 1 |
Kumar, Sanjeev | 1 |
Ozpolat, Ebru | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Evaluative | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Cechinel, Cristian; Sanchez-Alonso, Salvador; Garcia-Barriocanal, Elena – Computers & Education, 2011
The continuously growth of learning resources available in on-line repositories has raised the concern for the development of automated methods for quality assessment. The current existence of on-line evaluations in such repositories has opened the possibility of searching for statistical profiles of highly-rated resources that can be used as…
Descriptors: Discriminant Analysis, Educational Resources, Classification, Automation
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Ozpolat, Ebru; Akar, Gozde B. – Computers & Education, 2009
A desirable characteristic for an e-learning system is to provide the learner the most appropriate information based on his requirements and preferences. This can be achieved by capturing and utilizing the learner model. Learner models can be extracted based on personality factors like learning styles, behavioral factors like user's browsing…
Descriptors: Cognitive Style, Classification, Measures (Individuals), Measurement Techniques
Kumar, Sanjeev – ProQuest LLC, 2009
Information Technology has brought significant benefits to organizations by allowing greater information sharing within and across firm boundaries leading to performance improvements. Emerging technologies such as Service Oriented Architecture (SOA) and Web2.0 have transformed the volume and process of information sharing. However, a comprehensive…
Descriptors: Organizational Effectiveness, Information Technology, Decision Making, Business
Weinberg, Bella Hass – Proceedings of the ASIS Annual Meeting, 1996
Discusses detailed classification systems, sophisticated alphabetical indexing systems and reasons for the abandonment of complex indexing systems. The suggested structure for indexing the Internet or other large electronic collections of documents is based on that of book indexes: specific headings with coined modifications. (Author/AEF)
Descriptors: Classification, Computer System Design, Document Delivery, Electronic Libraries
Alexander, Bryan – Theory Into Practice, 2008
Students are, increasingly, digital content producers, and participate extensively in evolving online social networks. The emergence of the former represents subtle changes in students' experience of images, audience, copyright, ownership of learning, and technology. Experiencing the latter places students in an awkward position in terms of…
Descriptors: Intellectual Property, Educational Technology, Visual Environment, Social Networks

Chen, Hsinchun; Dhar, Vasant – Information Processing and Management, 1991
Two studies of the cognitive processes involved in online document-based information retrieval were conducted. These studies led to the development of five computational models of online document retrieval which were incorporated into the design of an "intelligent" document-based retrieval system. Both the system and the broader implications of…
Descriptors: Artificial Intelligence, Classification, Cognitive Processes, Computer System Design

Chowdhury, G. G. – Journal of Documentation, 1999
A survey of recent publications shows that frequent topics of Internet and information retrieval research are the effectiveness of search engines, information validation and quality, user studies, design of user interfaces, data structures and metadata, classification and vocabulary based aids, and indexing and search agents. The changing balance…
Descriptors: Classification, Computer Interfaces, Computer System Design, Indexing