Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 12 |
Since 2006 (last 20 years) | 50 |
Descriptor
Source
Author
Amodeo, Maryann | 1 |
Bai, Xue | 1 |
Baird, Catherine | 1 |
Borchert, Theresa | 1 |
Boston, George | 1 |
Boyce, Darryl K. | 1 |
Brown, Andrew | 1 |
Campbell, Robert | 1 |
Carey, Margaret | 1 |
Carpenter, C. Dale | 1 |
Carr, Patrick L. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 56 |
Postsecondary Education | 23 |
Adult Education | 2 |
Elementary Secondary Education | 2 |
High Schools | 1 |
Audience
Media Staff | 3 |
Teachers | 1 |
Location
Maryland | 4 |
Canada | 3 |
United Kingdom | 3 |
United States | 3 |
Australia | 2 |
Florida | 2 |
Indiana | 2 |
Michigan | 2 |
North Carolina | 2 |
Asia | 1 |
Bangladesh | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhiyong Qiu; Yingjin Cui – SAGE Open, 2024
Faced the vast amount of information, choosing the appropriate materials is a prerequisite for effective self-directed learning. The recommendation algorithm is a kind of intelligent technology that can accurately locate the required information which the users care about most. However, many recommendation techniques experience can not be trained…
Descriptors: College Students, Independent Study, Self Control, Library Materials
Kohn, Karen – portal: Libraries and the Academy, 2023
This study investigates how article downloads from ScienceDirect changed after Temple University Libraries downsized its all-inclusive Elsevier big deal bundle to a selective custom package. After the libraries lost current-year access to nearly half of Elsevier's active journals, the total downloads from Elsevier journals declined by 16.2 percent…
Descriptors: Research Libraries, Electronic Journals, Access to Information, Users (Information)
Taipalus, Toni; Siponen, Mikko; Vartiainen, Tero – ACM Transactions on Computing Education, 2018
SQL is taught in almost all university level database courses, yet SQL has received relatively little attention in educational research. In this study, we present a database management system independent categorization of SQL query errors that students make in an introductory database course. We base the categorization on previous literature,…
Descriptors: Programming Languages, Database Management Systems, Database Design, College Students
Rahman, Md. Habibur; Islam, Md. Shiful – Knowledge Management & E-Learning, 2020
The purpose of this study is to build a model for Digital Content Management (DCM) in agricultural university libraries in Bangladesh. The model focuses on identifying the necessary tools and techniques required for DCM and finding out the problems and prospects of DCM for enhancing resource sharing among the agricultural universities in…
Descriptors: Models, Information Management, Electronic Libraries, Academic Libraries
McGowan, Ian S. – International Association for Development of the Information Society, 2020
Upto now, the knowledge building influence of the fundamental communicative functions during an on-line collaborative learning (OLCL) session, i.e. argumentative, responsive, elicitative, informative and imperative have been mainly based on results from qualitative studies, results that could have been strengthened by quantitative approaches.…
Descriptors: Higher Education, Online Courses, Cooperative Learning, Computer Science Education
Sterman, Leila Belle; Clark, Jason A. – College & Research Libraries, 2017
Many research libraries are looking for new ways to demonstrate value for their parent institutions. Metrics, assessment, and promotion of research continue to grow in importance, but they have not always fallen into the scope of services for the research library. Montana State University (MSU) Library recognized a need and interest to quantify…
Descriptors: Citation Indexes, Scholarship, Research Libraries, Library Materials
Carr, Patrick L. – ProQuest LLC, 2017
This dissertation analyzes how North Carolina State University's (NCSU) James B. Hunt Jr. Library extends the ways in which the information architectures of academic research libraries can function as a technology, as discourse, and as rhetoric. The starting point for the analysis is the libraries of antiquity, which functioned technologically as…
Descriptors: Academic Libraries, Research Libraries, Library Automation, Library Development
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2018
One definition of a network administrator describes a person who works with computer infrastructures with an emphasis on networking. To determine the specific skills required of a network administrator by employers, data was collected from 698 nationwide job advertisements on Dice.com. The data collection focused on technical skills rather than…
Descriptors: Skill Analysis, Job Skills, Database Management Systems, Information Networks
Tobias, Christine – Journal of Library & Information Services In Distance Learning, 2017
The Michigan State University (MSU) Libraries' Website has a case of TMI: too much information organized by librarians for librarians. Finding relevant information about various library services, including the 24/7 Distance Learning Support Line, and access points to scholarly resources is often cumbersome, and given the limited time and staffing…
Descriptors: Usability, Web Sites, Program Implementation, Library Services
Ferrandino, Joseph – Journal of Higher Education Outreach and Engagement, 2018
This article details the Northwest Indiana Public Safety Data Consortium (NWIPSDC), a privately funded data-sharing network housed at Indiana University Northwest, an anchor institution, that includes several private-sector participants and over 30 public safety agencies at all levels of government (local, county, state, and federal). The NWIPSDC…
Descriptors: Safety, National Security, Consortia, Partnerships in Education
Grama, Joanna – EDUCAUSE, 2014
This "Just in Time" research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this…
Descriptors: Higher Education, Information Policy, Information Security, Privacy
Lavoie, Brian; Malpas, Constance – OCLC Online Computer Library Center, Inc., 2015
The long-term future of the scholarly record in its fullest expression cannot be effectively secured with stewardship strategies designed for print materials. The features of the evolving scholarly record suggest that traditional stewardship strategies, built on an "invisible hand" approach that relies on the uncoordinated,…
Descriptors: Academic Libraries, Library Development, Library Materials, Library Networks
Adding Bite to the Bark: Using LibGuides2 Migration as Impetus to Introduce Strong Content Standards
Fritch, Melia; Pitts, Joelle E. – Journal of Electronic Resources Librarianship, 2016
The authors discuss the long-term accumulation of unstandardized and inaccessible content within the Libguides system and the decision-making process to create and implement a set of standards using the migration to the LibGuides2 platform as a vehicle for change. Included in the discussion are strategies for the creation of standards and…
Descriptors: Standard Setting, Information Policy, Compliance (Legal), Change Strategies
Chidobi, Roseline Unoma – World Journal of Education, 2015
The purpose of the study is to identify the extent of ICT application in management of administrative and student personnel record in the public universities in Enugu state. The study was a survey research the quantitative data were collected through a 20-item questionnaire title "Extent of ICT Application in Record management"…
Descriptors: Foreign Countries, Information Management, Student Records, Public Colleges
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis