NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)14
Laws, Policies, & Programs
No Child Left Behind Act 20011
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 28 results Save | Export
Hall, Andrea; Huennekens, Bill – Center for the Integration of IDEA Data, 2016
Quality data allow programs to provide context and meaning to research, evaluation, and accountability efforts and provides evidence to evaluate and demonstrate the effectiveness of programs. Data integration, the process of taking data from disparate systems, combining them, and transforming them into something meaningful, can increase data…
Descriptors: Data Collection, Information Management, State Departments of Education, Standards
Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This call for action addresses the high-level benefits of adopting a university-wide policy regarding research data management. It identifies the various university stakeholders and suggests that the library initiate a conversation among them in order to get buy-in for a proactive, rather than reactive, high-level policy for responsible data…
Descriptors: Academic Libraries, Higher Education, Information Technology, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Cellucci, Leigh W.; Layman, Elizabeth J.; Campbell, Robert; Zeng, Xiaoming – Journal of Information Systems Education, 2011
Federal initiatives are encouraging the increase of IS graduates to work in the healthcare environment because they possess knowledge of datasets and dataset management that are key to effective management of electronic health records (EHRs) and health information technology (IT). IS graduates will be members of the healthcare team, and as such,…
Descriptors: Information Technology, Ethics, Information Science, Information Science Education
Akpabio, Akpabio Enebong Ema – ProQuest LLC, 2013
Despite huge growth in hospital technology systems, there remains a dearth of literature examining health care administrator's perceptions of the efficacy of interoperable EHR systems. A qualitative research methodology was used in this multiple-case study to investigate the application of diffusion of innovations theory and the technology…
Descriptors: Medical Services, Case Records, Database Management Systems, Adoption (Ideas)
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Starr, Joan – Computers in Libraries, 2010
In October 2009, California Digital Library (CDL), where the author serves as manager of strategic and project planning, jumped into the world of social networking by joining Twitter. From Twitter, the CDL staff publish the content of their monthly newsletter, "CDLINFO News," and also additional content created by CDL programs and…
Descriptors: Electronic Libraries, Information Technology, Database Management Systems, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Kaplan, Deborah – Journal of Archival Organization, 2009
Planning is necessary in selecting the appropriate digital asset management system for your institution. Key issues one should consider in planning: the objects to be stored, where they come from, and how they will be accessed; the end users; and the needed staffing levels for system maintenance. During the development of the system requirements,…
Descriptors: Information Management, Database Management Systems, Information Technology, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Gierlowski, Krzysztof; Nowicki, Krzysztof – International Journal of Distance Education Technologies, 2009
In this article we propose a novel e-learning system, dedicated strictly to knowledge assessment tasks. In its functioning it utilizes web-based technologies, but its design differs radically from currently popular e-learning solutions which rely mostly on thin-client architecture. Our research proved that such architecture, while well suited for…
Descriptors: Electronic Learning, Client Server Architecture, Computer System Design, Courseware
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Song, Sang Chul – ProQuest LLC, 2010
An unprecedented amount of information encompassing almost every facet of human activities across the world is generated daily in the form of zeros and ones, and that is often the only form in which such information is recorded. A good fraction of this information needs to be preserved for periods of time ranging from a few years to centuries.…
Descriptors: Information Needs, Information Sources, Indexing, Access to Information
Woods, Kam A. – ProQuest LLC, 2010
Over the past several decades, millions of digital objects of significant scientific, economic, cultural, and historic value have been published and distributed to libraries and archives on removable media. Providing long-term access to these documents, media files, and software executables is an increasingly complex task because of dependencies…
Descriptors: Computer Software, Research Libraries, Electronic Libraries, Archives
Peer reviewed Peer reviewed
T.H.E. Journal, 2004
The data defined in this article encompasses a range of topics, including data definitions, data management systems, infrastructure (both local and statewide), and the actual use of data to make decisions on either the administrative or instructional side. This emphasis on data has grown as technology has made the access and use of data easier.…
Descriptors: Data Analysis, Information Systems, Decision Making, Student Evaluation
Sankar, Chetan S. – Information Management Review, 1990
Argues that organizations need to integrate information systems, database management systems, and telecommunications in order to effectively manage and move information. Well-established frameworks in each of these areas are described and a new integrated framework is presented. A descriptive example is used to illustrate the power of the…
Descriptors: Database Management Systems, Decision Making, Information Management, Information Systems
Peer reviewed Peer reviewed
Manolopoulos, Yannis; Nardelli, Enrico; Papadopoulos, Apostolos; Proietti, Guido – Information Systems, 1997
Investigates the manipulation of large sets of two-dimensional data representing multiple overlapping features, and presents a new access method, the MOF-tree. Analyzes storage requirements and time with respect to window query operations involving multiple features. Examines both the pointer-based and pointerless MOF-tree representations.…
Descriptors: Computer System Design, Database Design, Database Management Systems, Information Management
Previous Page | Next Page ยป
Pages: 1  |  2