Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 13 |
Since 2016 (last 10 years) | 25 |
Since 2006 (last 20 years) | 111 |
Descriptor
Information Theory | 1217 |
Communication (Thought… | 418 |
Models | 216 |
Information Science | 135 |
Higher Education | 107 |
Information Systems | 101 |
Information Dissemination | 99 |
Cognitive Processes | 97 |
Mass Media | 94 |
Information Processing | 92 |
Research Methodology | 89 |
More ▼ |
Source
Author
Lanigan, Richard L. | 6 |
Yovits, M. C. | 6 |
Grunig, James E. | 5 |
Malik, M. F. | 5 |
Monge, Peter R. | 5 |
Moser, Gene W. | 5 |
Thayer, Lee | 5 |
Blake, Reed H. | 4 |
Lichtenberg, James W. | 4 |
McEwen, William J. | 4 |
Pearce, W. Barnett | 4 |
More ▼ |
Publication Type
Education Level
Higher Education | 34 |
Postsecondary Education | 11 |
Adult Education | 8 |
Elementary Secondary Education | 3 |
Secondary Education | 3 |
Early Childhood Education | 1 |
Grade 5 | 1 |
High Schools | 1 |
Middle Schools | 1 |
Two Year Colleges | 1 |
Laws, Policies, & Programs
Elementary and Secondary… | 1 |
Elementary and Secondary… | 1 |
Telecommunications Act 1996 | 1 |
Assessments and Surveys
Columbia Mental Maturity Scale | 1 |
Peabody Picture Vocabulary… | 1 |
Praxis Series | 1 |
Rotter Internal External… | 1 |
Stanford Binet Intelligence… | 1 |
Test of English as a Foreign… | 1 |
Woodcock Johnson Psycho… | 1 |
What Works Clearinghouse Rating

Gaines, Robert N. – Quarterly Journal of Speech, 1979
Discusses J. L. Austin's treatment of perlocution and extends it to an analysis of five types of perlocution. Proposes a set of conditions necessary and sufficient for consummation of any perlocutionary act. (JMF)
Descriptors: Information Theory, Persuasive Discourse, Rhetoric, Rhetorical Criticism

Wildgrube, Wolfgang – Educational and Psychological Measurement, 1979
A computer program named TEXT-1 is intended for quantitative content analysis. Any text may be taken as input. The program provides frequencies of words, syllables, or letters in alphabetical order; frequencies of sentences, subordinate clauses, or quotations; and measures used in information theory. (Author/JKS)
Descriptors: Computer Programs, Content Analysis, Information Theory, Language Research

Baddeley, Alan – Psychological Review, 1994
George A. Miller's essay gives a clear account of information theory and demonstrates how the concept of limited channel capacity can be applied across sensory dimensions. Its major influence has been demonstrating that immediate memory span is relatively insensitive to the amount of information per item. (SLD)
Descriptors: Cognitive Processes, Information Theory, Information Utilization, Memory

Bookstein, A.; And Others – Information Processing & Management, 1994
Examines two models to study the consequences for coding efficiency of sample fluctuations, a specific type of error in the statistics on which data compression codes are based. The possibility that random fluctuation can be exploited for data compression is discussed. (six references) (KRN)
Descriptors: Coding, Comparative Analysis, Information Storage, Information Theory

Day, Ronald E. – Journal of the American Society for Information Science, 2000
Examines information theory from the aspect of its conduit metaphor. An historical background shows how this metaphor was used to construct notions of language, information, information theory, and information science, and was used to extend the range of these notions across social and political space during the Cold War. (Author/LRW)
Descriptors: Information Science, Information Theory, Language, Metaphors
Marion, Russ; Richardson, Michael D. – 1991
Chaos theory describes the way systems change over time. It proposes that systems governed by physical laws can undergo transitions to a highly irregular form of behavior and that although chaotic behavior appears random, it is governed by strict mathematical conditions. This paper applies chaos theory to administrative and organizational issues.…
Descriptors: Chaos Theory, Information Theory, Mathematical Models, Organizational Theories
Teskey, F. N. – 1986
This paper identifies the need for a new theory of information and develops a mathematical model which distinguishes between: (1) data, as directly observable facts; (2) information, as structured collections of data; and (3) knowledge, as methods of using information. The model is based on the ideas of the binary relational model and uses the…
Descriptors: Cognitive Psychology, Information Retrieval, Information Science, Information Theory

Rosenberg, Victor – Journal of the American Society for Information Science, 1974
Descriptors: Communication (Thought Transfer), Computer Oriented Programs, Information Science, Information Theory

Vagianos, Louis – International Library Review, 1974
History of international library and information organizations, as well as the status of communications among them, and the organizations' present role and future possibilities. (LS)
Descriptors: Information Dissemination, Information Theory, International Organizations, Library Associations
Brown, Rexford – Compact, 1975
Describes the campaign by the National Council of Teachers of English Committee on Public Doublespeak to expose and denounce self-serving, deceptive, and sloppy uses of English. Also discusses the dangerous political and social implications of chronic language misuse by public officials, especially educators. (JG)
Descriptors: Communication (Thought Transfer), Credibility, English, Information Theory
Streufert, Siegfried – J Exp Soc Psychol, 1969
Research supported by the Office of Naval Research, Group Psychology Branch.
Descriptors: Decision Making, Failure, Information Theory, Learning Theories

Rothstein, Jerome – 1977
Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…
Descriptors: Algorithms, Codification, Computer Programs, Confidentiality
MACCIA, ELIZABETH S.; AND OTHERS – 1966
AN ANNOTATED BIBLIOGRAPHY OF 20 ITEMS AND A DISCUSSION OF ITS SIGNIFICANCE WAS PRESENTED TO DESCRIBE CURRENT UTILIZATION OF SUBJECT THEORIES IN THE CONSTRUCTION OF AN EDUCATIONAL THEORY. ALSO, A THEORY MODEL WAS USED TO DEMONSTRATE CONSTRUCTION OF A SCIENTIFIC EDUCATIONAL THEORY. THE THEORY MODEL INCORPORATED SET THEORY (S), INFORMATION THEORY…
Descriptors: Educational Theories, Information Theory, Mathematical Models, Models

Winn, William – 1974
In view of the apparent complexity and dynamism of the learner, only a systems approach to learning processes can provide a viable and practical frame of reference within which to conduct educational research. There are fundamental weaknesses in the current cybernetic model of learning, and therefore, it is useful to consider the learner as an…
Descriptors: Cybernetics, Information Theory, Learning Processes, Models
Bernstein, George B. – 1969
This study developed a variation of the DELPHI approach, a polling technique for systematically soliciting opinions from experts, to produce a technological forecast of developments in the information-processing industry. SEER (System for Event Evaluation and Review) combines the more desirable elements of existing techniques: (1) intuitive…
Descriptors: Data Processing, Decision Making, Information Processing, Information Theory