NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Buczynski, James A. – Journal of Electronic Resources Librarianship, 2008
Libraries are integrating Web 2.0 services into work practices, positioning themselves in online social environments, and deploying enhanced search and discovery tools. Collections conversely are not progressing to the same degree. Like many public services today, library budgets are stained. User-pay options are appearing in library systems,…
Descriptors: Library Services, Internet, Social Networks, Information Technology
Bohle, Shannon – Library Journal, 2008
With all the new advances in library technology--including metadata, social networking, and Web 2.0, along with the advent of nonlibrary and for-profit digital information companies like Wikisource and Google Print--librarians have barely had time to reflect on the nontechnical implications of these innovations. They need to take a step back and…
Descriptors: Information Management, Archives, Metadata, Librarians
Peer reviewed Peer reviewed
Direct linkDirect link
Alexander, Bryan – Theory Into Practice, 2008
Students are, increasingly, digital content producers, and participate extensively in evolving online social networks. The emergence of the former represents subtle changes in students' experience of images, audience, copyright, ownership of learning, and technology. Experiencing the latter places students in an awkward position in terms of…
Descriptors: Intellectual Property, Educational Technology, Visual Environment, Social Networks
Miller, Eric – D-Lib Magazine, 1998
The Resource Description Framework (RDF) is an infrastructure that enables the encoding, exchange and reuse of structured metadata. RDF additionally provides a means for publishing both human-readable and machine-readable vocabularies designed to encourage the reuse and extension of metadata semantics among disparate information communities.…
Descriptors: Computer Mediated Communication, Computer Oriented Programs, Electronic Publishing, Information Dissemination
Peer reviewed Peer reviewed
Direct linkDirect link
Duncan, Steve – Quarterly Review of Distance Education, 2005
One of the most significant events that heralded the Department of Defense's commitment to distance education was the Advanced Distributed Learning (ADL) Initiative, which held its kickoff meeting in Washington, DC in 1997. This meeting provided the army and other military services the endorsement that had been lacking relative to implementing…
Descriptors: Educational Strategies, Costs, Instructional Development, Educational Innovation
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers