NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)3
Since 2006 (last 20 years)26
Assessments and Surveys
What Works Clearinghouse Rating
Showing 31 to 45 of 78 results Save | Export
Hope, Barbara; Mattingly, Maribeth; Spear, Eric; Glasser, Mike – 1999
The University of Maryland, College Park recognized in the 1990s that its institutional data was an asset that needed to be managed. In this Information Age, data must be turned into knowledge quickly and accurately. The University of Maryland implemented a campus data warehouse, and along with it a comprehensive meta data platform for helping…
Descriptors: Copyrights, Fair Use (Copyrights), Higher Education, Information Networks
Peer reviewed Peer reviewed
Reekie, A. F. – Journal of Government Information, 1995
The European Commission is responsible for the development of online information systems and for providing public databases of information on the European Union's activities. Topics include the union's telecommunications policy and role; network facilities; ways to access online services; programs to promote the use of information services; and a…
Descriptors: Access to Information, Community Information Services, Databases, Information Networks
Peer reviewed Peer reviewed
McClure, Charles R.; Moen, William E.; Bertot, John Carlo – Journal of the American Society for Information Science, 1999
Demonstrates the use of a descriptive assessment of an information policy initiative using the Government Information Locator Service (GILS) as an example. Techniques discussed include historical perspective, review of the key policy instrument, descriptive modeling, side-by-side analysis, review of related policy instruments, literature review,…
Descriptors: Evaluation Methods, Federal Government, Government (Administrative Body), Information Networks
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Pacific Telecommunications Council, Honolulu, HI. – 2001
This document comprises the proceedings of the 2001 conference of the Pacific Telecommunications Council. Papers are included on: implementation of e-commerce applications; use of corporate e-mail; socio-economic considerations in the adoption of new technologies; an innovation standard for telecommunications universal service; call center-based…
Descriptors: Access to Information, Foreign Countries, Information Networks, Information Policy
Peer reviewed Peer reviewed
Dorner, Daniel G. – Library Quarterly, 2002
Explores organizational influence in the policy network that formed around the issue of determining essential services on the Canadian information highway. Qualitative content analysis found the essential services issue had two main aspects: ensuring universal access to telecommunications networks and determining the criteria for defining…
Descriptors: Access to Information, Computer Networks, Foreign Countries, Information Networks
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Latimore, Ritchie R. – 1997
This paper addresses online classroom and electronic library issues which include the myriad of technical difficulties encountered, along with physical and intellectual property rights. It also makes a statistical comparison of two proportions of Internet access between city and rural schools. An inescapable time lag between the introduction of…
Descriptors: Computer Networks, Electronic Classrooms, Electronic Libraries, Information Networks
Peer reviewed Peer reviewed
Hedstrom, Margaret; Wallace, David – Journal of the American Society for Information Science, 1999
Discusses challenges to recordkeeping in a networked environment and describes emerging models. Suggests these principles that inform recordkeeping policies for National Information Infrastructure (NII) applications: move recordkeeping issues onto the agendas for planning and system design; understand recordkeeping requirements before systems are…
Descriptors: Computer System Design, Information Management, Information Networks, Information Policy
Garvey, Alan – Information Management & Technology, 1997
Outlines three rules to help companies plan for and implement intranets: (1) adopt a long-term vision for corporate Intranet usage; (2) create a culture of information usage; and (3) recognize, adapt to and take advantage of the inherent qualities of electronic information. (AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Corporations, Information Management
Peer reviewed Peer reviewed
Braman, Sandra – Annual Review of Information Science and Technology (ARIST), 1995
Reviews the literature on Internet information policy: an awareness of new policy issues, attempts to apply existing legal regulations to new processes, and the need for new policies for the Net. Explores policy issues that affect the structure of government, the economy, society, designers of the Net, and international issues. Contains 658…
Descriptors: Economic Impact, Federal Regulation, Governmental Structure, Information Networks
Peer reviewed Peer reviewed
Akdeniz, Yaman – Australian Library Journal, 1998
Content-control proposals have been found to be more intrusive and restrictive than supporters of rating systems and filtering software claim. These systems often exceed claims in types of content restricted, numbers and types of people prevented from reaching content, technical changes required to public electronic networks, and burdens on…
Descriptors: Access to Information, Censorship, Computer System Design, Freedom of Information
Proceedings of the ASIST Annual Meeting, 2001
Abstracts and descriptions of Special Interest Group (SIG) and Panel Sessions include such topics as: knowledge management; information networks; courseware; accreditation; Web site design; information retrieval and processing; digital imaging; electronic journals; human computer interaction; digital libraries; digital divide; information science;…
Descriptors: Computer System Design, Electronic Journals, Electronic Libraries, Information Management
PDF pending restoration PDF pending restoration
American Library Association, Chicago, IL. Office of Intellectual Freedom. – 1996
The American Library Association (ALA) expresses the basic principles of librarianship in its "Code of Ethics" and in the "Library Bill of Rights" and its interpretations. All library system and network policies, procedures or regulations relating to electronic resources and services should be scrutinized for potential…
Descriptors: Access to Information, Freedom of Information, Guidelines, Information Networks
Peer reviewed Peer reviewed
Shrum, Wesley; Beggs, John J. – Knowledge and Policy, 1997
Describes a multifaceted approach for generating systematic information on scientific and technological institutions in developing countries based on the concept of the research system as a multiorganizational network. Provides an account of how this approach was implemented in a three-country study to shed light on problems in developing…
Descriptors: Developing Nations, Information Networks, Information Policy, Information Technology
Pages: 1  |  2  |  3  |  4  |  5  |  6