Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Access to Information | 6 |
| Database Design | 6 |
| Information Technology | 6 |
| Information Retrieval | 4 |
| Database Management Systems | 3 |
| Information Management | 3 |
| Bibliographic Databases | 2 |
| Classification | 2 |
| Electronic Publishing | 2 |
| Information Systems | 2 |
| Archives | 1 |
| More ▼ | |
Source
| ProQuest LLC | 2 |
| Journal of Information… | 1 |
| Journal of Library… | 1 |
| Library Trends | 1 |
| Program: Electronic Library… | 1 |
Author
| Brudvig, Glenn L. | 1 |
| Chang, Naicheng | 1 |
| Murray, Meg Coffin | 1 |
| Norton, M. Jay | 1 |
| Samia Shafique | 1 |
| Song, Sang Chul | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Dissertations/Theses -… | 2 |
| Opinion Papers | 1 |
| Reports - Research | 1 |
Education Level
| Adult Education | 1 |
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Samia Shafique – ProQuest LLC, 2024
Shoeprints are a common type of evidence found at crime scenes and are regularly used in forensic investigations. However, their utility is limited by the lack of reference footwear databases that cover the large and growing number of distinct shoe models. Additionally, existing methods for matching crime-scene shoeprints to reference databases…
Descriptors: Crime, Court Litigation, Database Design, Database Management Systems
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Peer reviewedNorton, M. Jay – Library Trends, 1999
Knowledge discovery in databases (KDD) revolves around the investigation and creation of knowledge, processes, algorithms, and mechanisms for retrieving knowledge from data collections. The article is an introductory overview of KDD. The rationale and environment of its development and applications are discussed. Issues related to database design…
Descriptors: Access to Information, Automation, Bibliographic Databases, Classification
Chang, Naicheng – Program: Electronic Library and Information Systems, 2005
Purpose: To help to clarify the role of XML tools and standards in supporting transition and migration towards a fully XML-based environment for managing access to information. Design/methodology/approach: The Ching Digital Image Library, built on a three-tier architecture, is used as a source of examples to illustrate a number of methods of data…
Descriptors: Electronic Libraries, Visual Aids, Classification, Programming Languages
Peer reviewedBrudvig, Glenn L. – Journal of Library Administration, 1991
Describes the development of California Institute of Technology Libraries' local database of articles from science and engineering journals and its integrated document request and delivery feature. It is noted that not all journals received by the libraries are in the database, backfiles are limited, and coverage is not comprehensive. (five…
Descriptors: Access to Information, Bibliographic Databases, College Libraries, Database Design

Direct link
