Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Information storage and retrieval systems – Zimbabwe – Students“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Information storage and retrieval systems – Zimbabwe – Students" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Information storage and retrieval systems – Zimbabwe – Students"
Eller, Ben F., Alan S. Kaufman und James E. McLean. „Computer-Based Assessment of Cognitive Abilities: Current Status/Future Directions“. Journal of Educational Technology Systems 15, Nr. 2 (Dezember 1986): 137–47. http://dx.doi.org/10.2190/545h-mvcj-vdap-ftx9.
Der volle Inhalt der QuelleTsai, Chih-Fong, Shih-Wen Ke, Kenneth McGarry und Ming-Yi Lin. „LocalContent: a personal scientific document retrieval system“. Electronic Library 33, Nr. 3 (01.06.2015): 373–85. http://dx.doi.org/10.1108/el-08-2013-0148.
Der volle Inhalt der QuelleHandayani, Putu Wuri, Stéphane Bressan, Doan Khanh Han und Omar Boucelma. „IMPLEMENTASI SISTEM PENGELOLAAN PROSES BISNIS MENGACU PADA MIT PROCESS HANDBOOK“. Jurnal Sistem Informasi 5, Nr. 2 (13.07.2012): 106. http://dx.doi.org/10.21609/jsi.v5i2.270.
Der volle Inhalt der QuelleDissertationen zum Thema "Information storage and retrieval systems – Zimbabwe – Students"
Kagoro, Kisemiire Christine. „Evaluation of the development and use of the institutional repository by staff and students at the University of Fort Hare in Eastern Cape, South Africa“. Thesis, University of Fort Hare, 2018. http://hdl.handle.net/10353/6292.
Der volle Inhalt der QuelleHe, Xue Wei. „Exploring health and fitness apps adoption intention among college students“. Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3952604.
Der volle Inhalt der QuelleMalaney, Gary Douglas. „The coordination of information in a highly differentiated organization : use of a computerized relational data base system as an integrating device for monitoring graduate education /“. The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487261919113367.
Der volle Inhalt der QuelleAlemu, Getahun. „White Board“. CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2195.
Der volle Inhalt der QuelleMaguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.
Der volle Inhalt der QuelleSchool of Computing
Ph. D. (Information Systems)
Zhou, Samson Zigah. „Understanding the inter-relationships for the creation of a local land information system : the Zimbabwean local government experience at growth points“. Thesis, 2000. http://hdl.handle.net/10413/5400.
Der volle Inhalt der QuelleThesis (M.Sc.Sur.)-University of Natal, Durban, 2000.
Newbold, Margaret C. „A comparison of sixth-grade students' access, retrieval, and utilization of information obtained from CD-ROM and print sources“. 1993. http://books.google.com/books?id=PsecAAAAMAAJ.
Der volle Inhalt der QuelleIncludes abstract. "March, 1993." eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 181-187).
Musonza, Dimax. „The implementation of integrated security systems: case study of the industrial sector of Harare-Zimbabwe“. Diss., 2016. http://hdl.handle.net/10500/21012.
Der volle Inhalt der QuelleIndustrial sites in Harare contribute significantly to the economy of Zimbabwe. Harare is the capital city of Zimbabwe and therefore has significant manufacturing and commercial activity. The protection of industrial sites is very important because of the presence of valuable assets and operations. Therefore the main purpose of deploying security measures at industry premises is to create a safe and secure environment for the business functions. Security management is consequently an important element of an industrial organisation’s continuity. The implementation of integrated security systems was examined to some extent within this study. The size and nature of industrial facilities influenced this study to view integrated security systems as more effective than stand-alone security measures. The study sought to investigate the various aspects associated with the implementation. The purposes of the research included the following: • Examine current practices, benefits, shortcomings in the implementation of integrated security systems; • Critically evaluate the security management aspects required for the implementation ofintegrated security systems; • Investigate successes and failures associated with integrated security systems and how implementation can be improved; • Examine and identify factors necessary for a best practice approach to integrated security systems; and • Determine a methodology for the effective implementation of integrated security systems. Additionally the study briefly examined how security systems integration can assist in reducing the problem of connivance to theft at receiving and dispatch points at industrial facilities. The report is divided into five chapters. Chapter 1 covers the research problem, Chapter 2 deals with the research methods while Chapter 3 has insightful information from literature review. Chapter 4 presents the data and how it was analysed. Lastly Chapter 5 has findings, recommendations and conclusions. The study used the mixed-method approach. This approach includes both qualitative and quantitative research in order to gain a more in-depth understanding of the research problem. The methods of data collection were site visits, interviews and questionnaires. The sample was drawn from a cross-section of sites within the industrial areas of Workington, Southerton, Willowvale, Graniteside, Msasa and few outside industries in the vicinity of Harare. A total of 11 sites were observed. The interviews consisted of 30 participants who were mainly security practitioners at management level as well as some non-security managers. In addition, a total of 102 respondents participated in this study by completing the questionnaire. The majority of the respondents were security practitioners who were the main focus of the study. The findings support the various aspects of the implementation of integrated security systems. The conclusions emanating from the statistical analysis of the collected data included the following: • The critical assets for protection at industrial facilities are infrastructure, products, revenue, people and other movable items or equipment; • The main threat sources are from outsiders, crime syndicates and employees; • Security systems suitable for integration are CCTV, electronic access control, alarms, personnel, policies and procedures backed by information communication technologies. • Security should be functionally integrated with other departments which include Information Technology, Human Resources, Finance, Operations and Marketing; • The preferred mode of linkage was established to be fibre optic on a local area or wide area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration. area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration.
Security Risk Management
M. Tech. (Security Management)
Davis, Dorothy Frances. „A comparison of bibliographic instruction methods on CD-ROM databases“. 1992. http://books.google.com/books?id=nhzhAAAAMAAJ.
Der volle Inhalt der QuelleBrown, Lyn Stephen. „Development, implementation, and evaluation of an information literacy program for the undergraduate school at Philadelphia College of Bible“. 1996. http://books.google.com/books?id=WxzhAAAAMAAJ.
Der volle Inhalt der QuelleBücher zum Thema "Information storage and retrieval systems – Zimbabwe – Students"
Students' guide to information technology. 2. Aufl. Oxford: Newnes, 1993.
Den vollen Inhalt der Quelle findenCarter, Roger. Students' guide to information technology. Oxford: Heinemann Newnes, 1989.
Den vollen Inhalt der Quelle findenMotomatsu, Nancy R. Research goes to school: Teaching students to go online (under Chapter 2 - ECIA). Olympia, WA: Superintendent of Public Instruction, 1987.
Den vollen Inhalt der Quelle findenUniversity of Pittsburgh 1990 American Society of Information Science Student Conference (1990 University of Pittsburgh). Proceedings of the University of Pittsburgh 1990 American Society for Information Science Students Conference. Pittsburgh, PA: School of Library and Information Science, University of Pittsburgh, 1990.
Den vollen Inhalt der Quelle findenLexis-Nexis for law students. 3. Aufl. Larchmont, NY: Emanuel, 1997.
Den vollen Inhalt der Quelle findenLEXIS-NEXIS for law students. Larchmont, NY: Emanuel Law Outlines, 1994.
Den vollen Inhalt der Quelle findenLexis-Nexis for law students. 2. Aufl. Larchmont, NY: Emanuel, 1995.
Den vollen Inhalt der Quelle findenHannes, Britz, Hrsg. Information, ethics and the law: A guide for information practitioners, students and the corporate environment. Pretoria, South Africa: Van Schaik, 2006.
Den vollen Inhalt der Quelle findenFranklin, Hugh Lockwood. Comprehensive literature searching in engineering: Textbook for Engr. 485. [Corvallis, Or.]: Oregon State University, 1987.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Student financial aid: Federal aid awarded to students taking remedial courses : report to the ranking minority member, Subcommittee on Postsecondary Education, Training, and Life-Long Learning, Committee on Education and the Workforce, House of Representatives. Washington, D.C: The Office, 1997.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Information storage and retrieval systems – Zimbabwe – Students"
Kehinde, Adetola. „Digital Libraries and the Role of Digital Librarians“. In Advances in Library and Information Science, 98–119. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3093-0.ch006.
Der volle Inhalt der QuelleKehinde, Adetola. „Digital Libraries and the Role of Digital Librarians“. In Research Anthology on Collaboration, Digital Services, and Resource Management for the Sustainability of Libraries, 17–38. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8051-6.ch002.
Der volle Inhalt der Quelle