Auswahl der wissenschaftlichen Literatur zum Thema „Information storage and retrieval systems – Zimbabwe – Students“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Information storage and retrieval systems – Zimbabwe – Students" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Information storage and retrieval systems – Zimbabwe – Students"

1

Eller, Ben F., Alan S. Kaufman und James E. McLean. „Computer-Based Assessment of Cognitive Abilities: Current Status/Future Directions“. Journal of Educational Technology Systems 15, Nr. 2 (Dezember 1986): 137–47. http://dx.doi.org/10.2190/545h-mvcj-vdap-ftx9.

Der volle Inhalt der Quelle
Annotation:
Rapid advances in the computer industry and the concomitant knowledge explosion have created a revolution in the information handling electronics industry. The continued proliferation of computer technology in the educational environment appears inevitable. There seems to be little doubt that recent advances in educational technology will have important consequences for educational institutions at all levels during the coming decades. Students, teachers, and administrators alike have already come to rely on bibliographic and statistical data bases, automated dictionaries, micrographic storage and retrieval systems, and specialized interactive cable and videotext systems for information access. Despite the impact of computer technology in the school environment, guidelines for planning and developing useable software for assessing cognitive abilities has warranted little attention in educational literature. This article suggests that computer-based support systems are now available which could be instrumental in solving the problems associated with cognitive assessment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Tsai, Chih-Fong, Shih-Wen Ke, Kenneth McGarry und Ming-Yi Lin. „LocalContent: a personal scientific document retrieval system“. Electronic Library 33, Nr. 3 (01.06.2015): 373–85. http://dx.doi.org/10.1108/el-08-2013-0148.

Der volle Inhalt der Quelle
Annotation:
Purpose – The purpose of this paper is to introduce a novel personal scientific document retrieval system. The most common approach taken for the storage of personal documents is to construct a hierarchical folder structure. Most users prefer searching for documents by manually traversing their organizational hierarchy until reaching the location where the target item is stored, then locating the specific documents within its directory or folder. However, this is very time-consuming, especially when the number of personal scientific documents is very large. Unfortunately, related personal information management (PIM) systems, which provide solutions for managing various types of personal information, have thus far made little progress at managing personal scientific documents. Design/methodology/approach – In this paper, we introduce the design of a personal scientific document retrieval system, namely, LocalContent. It is composed of database indexing and retrieval stages. During indexing, term feature extraction from scientific documents is performed by the natural language processing technique. The extracted terms are stored in the inverted index for later retrieval. For retrieval, a graphical user interface is provided by LocalContent, which allows users to search their personal scientific documents. Findings – The evaluation results based on 20 different personal archives taken from 20 graduate students show that LocalContent is simple to use and can facilitate the search for relevant scientific documents. Moreover, these users were willing to have a system which provides specialized search functions like LocalContent to explore their personal scientific documents in the future. Originality/value – LocalContent is a novel scientific document retrieval system and provides several particular functions of LocalContent including displaying the content summary of the query term frequency in each specific section of the retrieved documents, querying by local section specification and providing a number of recommended keywords related to the query terms.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Handayani, Putu Wuri, Stéphane Bressan, Doan Khanh Han und Omar Boucelma. „IMPLEMENTASI SISTEM PENGELOLAAN PROSES BISNIS MENGACU PADA MIT PROCESS HANDBOOK“. Jurnal Sistem Informasi 5, Nr. 2 (13.07.2012): 106. http://dx.doi.org/10.21609/jsi.v5i2.270.

Der volle Inhalt der Quelle
Annotation:
MIT Process Handbook menawarkan metode penyimpanan dan pencarian proses bisnis suatu organisasi. Komunitas bisnis atau mahasiswa yang mengambil topik kuliah proses bisnis dapat mempelajari best-practice proses bisnis yang terdapat dalam MIT Process Handbook. Kumpulan proses bisnis yang terdapat di MIT Process Handbook hanya mengelola deskripsi proses bisnis tersebut dalam format teks. Kemunculan teknologi Extensible Markup Language (XML), kemampuan XML dalam melakukan query, adopsi dari banyak industri untuk menggunakan standar berbasis XML dalam pendefinisian dan pengeksekusian proses bisnis serta dukungan dari sistem basis data yang sudah mendukung penyimpanan data dalam format XML memudahkan semua pihak dalam perancangan dan implementasi sistem pengelolaan bisnis proses dengan mengadopsi standar dan teknologi XML ini. Sistem pengelolaan proses bisnis ini dapat digunakan untuk mengelola, mendistribusikan, dan melakukan query terhadap proses bisnis tertentu. Penelitian ini menjelaskan mengenai rancangan dan arsitektur sistem pengelolaan proses bisnis dengan kumpulan proses bisnis yang dapat digunakan untuk mengajar mata kuliah Business Process Management di program studi Sistem Informasi. MIT Process Handbook offers a method of storage and retrieval of an organization's business processes. Business community or college students who take the topic of business processes can learn best-practice business processes contained in the MIT Process Handbook. Collection of business processes that are contained in the MIT Process Handbook only manage the business process description in text. The emergence of Extensible Markup Language (XML), XML querying capabilities, adoption of many industries to use XML-based standards in the definition and execution of business processes and data base system that supports data storage in XML format facilitates all parties in the design and implementation of business process management systems by adopting these standards and XML technologies. Business process management systems can be used to manage, distribute, and perform a query against a particular business process. This study describes the design and architecture of business process management system with a collection of business processes that can be used to teach Business Process Management in Information Systems courses.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Information storage and retrieval systems – Zimbabwe – Students"

1

Kagoro, Kisemiire Christine. „Evaluation of the development and use of the institutional repository by staff and students at the University of Fort Hare in Eastern Cape, South Africa“. Thesis, University of Fort Hare, 2018. http://hdl.handle.net/10353/6292.

Der volle Inhalt der Quelle
Annotation:
This study sought to evaluate the development and use of Institutional Repository by staff and students at the University of Fort Hare (UFH) in Eastern Cape, South Africa. In this study, staff comprised of academic staff (lecturers) and library staff. The aim of this study was to investigate the development and use of Institutional Repository at UFH. To achieve the objectives, both qualitative and quantitative research methodologies were employed. Data was collected through questionnaires and face-to-face interviews. Purposive sampling technique was used to select the participants of the study. Qualitative data was analysed thematically while, quantitative data was analysed statically by help of SPSS software. The results showed that: library staff and management are aware and provide support for the development and use of the Institutional Repository at the UFH; awareness level of IR among lecturers and students is still low; the infrastructure available for the use of IR is not well developed; and lastly, library users which consist of students and academic staff face various barriers in the use and support of IR development. The study recommended for dynamic training, and marketing of IR through seminars and workshops should be started by expert affiliations and universities administration to advance the idea of IR among the University community. Low levels of awareness of the university repository, funding and shortage of library staff remains an issue and could be addressed by further investigating the effectiveness of different communication channels. It is pertinent that the findings of this study would be useful in various tertiary’s institutions of higher learning across the globe in order to embark on IR.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

He, Xue Wei. „Exploring health and fitness apps adoption intention among college students“. Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3952604.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Malaney, Gary Douglas. „The coordination of information in a highly differentiated organization : use of a computerized relational data base system as an integrating device for monitoring graduate education /“. The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487261919113367.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alemu, Getahun. „White Board“. CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2195.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Maguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.

Der volle Inhalt der Quelle
Annotation:
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act (ZDPA) bill. Once enacted, the ZDPA bill will affect universities as public entities. It will directly impact how personal information is collected and processed. The bill will be fundamental in understanding the privacy perceptions of students in relation to privacy awareness, privacy expectations and confidence within university. These need to be understood to give guidelines to universities on the implementation of the ZPDA. Problem Statement: The current constitution and the ZDPA are not sufficient to give organisations guidelines on ensuring personal information privacy. There is need for guidelines to help organisations and institutions to implement and comply with the provisions of the ZDPA in the context of Zimbabwe. The privacy regulations, regarded as the three concepts (awareness, expectations and confidence), were used to determine the student perceptions. These three concepts have not been researched before in the privacy context and the relationship between the three concepts has not as yet been established. Research purpose: The main aim of the study was to develop and validate an Information Privacy Perception Survey (IPPS) diagnostic tool and a Student Personal Information Privacy Perception (SPIPP) model to give guidelines to universities on how they can implement the ZDPA and aid universities in comprehending student privacy perceptions to safeguard personal information and assist in giving effect to their privacy constitutional right. Research Methodology: A quantitative research method was used in a deductive research approach where a survey research strategy was applied using the IPPS instrument for data collection. The IPPS instrument was designed with 54 items that were developed from the literature. The preliminary instrument was taken through both the expert review and pilot study. Using the non-probability convenience sampling method, 287 students participated in the final survey. SPSS version 25 was used for data analysis. Both descriptive and inferential statistics were done. Exploratory factor analysis (EFA) was used to validate the instrument while confirmatory factor analysis (CFA) and the structural equation modelling (SEM) were used to validate the model. Main findings: diagnostic instrument was validated and resulted in seven new factors, namely university confidence (UC), privacy expectations (PE), individual awareness (IA), external awareness (EA), privacy awareness (PA), practice confidence (PC) and correctness expectations (CE). Students indicated that they had high expectations of the university on privacy. The new factors showed a high level of awareness of privacy and had low confidence in the university safeguarding their personal information privacy. A SPIPP empirical model was also validated using structural equation modelling (SEM) and it indicated an average overall good fit between the proposed SPIPP conceptual model and the empirically derived SPIPP model Contribution: A diagnostic instrument that measures the perceptions (privacy awareness, expectations and confidence of students) was developed and validated. This study further contributed a model for information privacy perceptions that illustrates the relationship between the three concepts (awareness, expectations and confidence). Other universities can use the model to ascertain the perceptions of students on privacy. This research also contributes to improvement in the personal information protection of students processed by universities. The results will aid university management and information regulators to implement measures to create a culture of privacy and to protect student data in line with regulatory requirements and best practice.
School of Computing
Ph. D. (Information Systems)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zhou, Samson Zigah. „Understanding the inter-relationships for the creation of a local land information system : the Zimbabwean local government experience at growth points“. Thesis, 2000. http://hdl.handle.net/10413/5400.

Der volle Inhalt der Quelle
Annotation:
Zimbabwe is made up of eight provinces, fifty-seven districts and as many Rural District Councils. In each district there is at least one Growth Point although some may have up to two or more. A Growth Point is a 'town or City in the making' and is usually, but not necessarily the capital of a district. Rural District Councils, which form the local administrative authority and have administrative responsibility over the land that falls within their jurisdictions, are often located at these Growth Points. These local authorities liaise and interact closely with central government, which is made up of Ministries and Departments with different functions, which somehow hinge on the administration of the land. This makes the linkages and land information flows, based on land records crucial. The legacy of the history of separate development introduced and left systems of government, which are complex and hinder a free flow of information within central government and also between central and local governments. These linkages and interrelationships are mapped and traced with a view to streamlining information flows in order to eliminate or minimize flaws . While the efforts of decentralisation towards this goal are recognized, the shortcomings have been cited and the thesis makes some recommendations based on a research undertaken with the cooperation of Gokwe Rural District Council at Gokwe Growth Point. The thesis recommends strengthening the local capacity by assisting their efforts to computerise their records and eventually develop that into a fully integrated local Land Information System that should eventually be linked to the National System.
Thesis (M.Sc.Sur.)-University of Natal, Durban, 2000.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Newbold, Margaret C. „A comparison of sixth-grade students' access, retrieval, and utilization of information obtained from CD-ROM and print sources“. 1993. http://books.google.com/books?id=PsecAAAAMAAJ.

Der volle Inhalt der Quelle
Annotation:
Thesis (Ed. D.)--University of Missouri--St. Louis, 1993.
Includes abstract. "March, 1993." eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 181-187).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Musonza, Dimax. „The implementation of integrated security systems: case study of the industrial sector of Harare-Zimbabwe“. Diss., 2016. http://hdl.handle.net/10500/21012.

Der volle Inhalt der Quelle
Annotation:
Text in English
Industrial sites in Harare contribute significantly to the economy of Zimbabwe. Harare is the capital city of Zimbabwe and therefore has significant manufacturing and commercial activity. The protection of industrial sites is very important because of the presence of valuable assets and operations. Therefore the main purpose of deploying security measures at industry premises is to create a safe and secure environment for the business functions. Security management is consequently an important element of an industrial organisation’s continuity. The implementation of integrated security systems was examined to some extent within this study. The size and nature of industrial facilities influenced this study to view integrated security systems as more effective than stand-alone security measures. The study sought to investigate the various aspects associated with the implementation. The purposes of the research included the following: • Examine current practices, benefits, shortcomings in the implementation of integrated security systems; • Critically evaluate the security management aspects required for the implementation ofintegrated security systems; • Investigate successes and failures associated with integrated security systems and how implementation can be improved; • Examine and identify factors necessary for a best practice approach to integrated security systems; and • Determine a methodology for the effective implementation of integrated security systems. Additionally the study briefly examined how security systems integration can assist in reducing the problem of connivance to theft at receiving and dispatch points at industrial facilities. The report is divided into five chapters. Chapter 1 covers the research problem, Chapter 2 deals with the research methods while Chapter 3 has insightful information from literature review. Chapter 4 presents the data and how it was analysed. Lastly Chapter 5 has findings, recommendations and conclusions. The study used the mixed-method approach. This approach includes both qualitative and quantitative research in order to gain a more in-depth understanding of the research problem. The methods of data collection were site visits, interviews and questionnaires. The sample was drawn from a cross-section of sites within the industrial areas of Workington, Southerton, Willowvale, Graniteside, Msasa and few outside industries in the vicinity of Harare. A total of 11 sites were observed. The interviews consisted of 30 participants who were mainly security practitioners at management level as well as some non-security managers. In addition, a total of 102 respondents participated in this study by completing the questionnaire. The majority of the respondents were security practitioners who were the main focus of the study. The findings support the various aspects of the implementation of integrated security systems. The conclusions emanating from the statistical analysis of the collected data included the following: • The critical assets for protection at industrial facilities are infrastructure, products, revenue, people and other movable items or equipment; • The main threat sources are from outsiders, crime syndicates and employees; • Security systems suitable for integration are CCTV, electronic access control, alarms, personnel, policies and procedures backed by information communication technologies. • Security should be functionally integrated with other departments which include Information Technology, Human Resources, Finance, Operations and Marketing; • The preferred mode of linkage was established to be fibre optic on a local area or wide area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration. area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration.
Security Risk Management
M. Tech. (Security Management)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Davis, Dorothy Frances. „A comparison of bibliographic instruction methods on CD-ROM databases“. 1992. http://books.google.com/books?id=nhzhAAAAMAAJ.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Brown, Lyn Stephen. „Development, implementation, and evaluation of an information literacy program for the undergraduate school at Philadelphia College of Bible“. 1996. http://books.google.com/books?id=WxzhAAAAMAAJ.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Information storage and retrieval systems – Zimbabwe – Students"

1

Students' guide to information technology. 2. Aufl. Oxford: Newnes, 1993.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Carter, Roger. Students' guide to information technology. Oxford: Heinemann Newnes, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Motomatsu, Nancy R. Research goes to school: Teaching students to go online (under Chapter 2 - ECIA). Olympia, WA: Superintendent of Public Instruction, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

University of Pittsburgh 1990 American Society of Information Science Student Conference (1990 University of Pittsburgh). Proceedings of the University of Pittsburgh 1990 American Society for Information Science Students Conference. Pittsburgh, PA: School of Library and Information Science, University of Pittsburgh, 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Lexis-Nexis for law students. 3. Aufl. Larchmont, NY: Emanuel, 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

LEXIS-NEXIS for law students. Larchmont, NY: Emanuel Law Outlines, 1994.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Lexis-Nexis for law students. 2. Aufl. Larchmont, NY: Emanuel, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hannes, Britz, Hrsg. Information, ethics and the law: A guide for information practitioners, students and the corporate environment. Pretoria, South Africa: Van Schaik, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Franklin, Hugh Lockwood. Comprehensive literature searching in engineering: Textbook for Engr. 485. [Corvallis, Or.]: Oregon State University, 1987.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Office, General Accounting. Student financial aid: Federal aid awarded to students taking remedial courses : report to the ranking minority member, Subcommittee on Postsecondary Education, Training, and Life-Long Learning, Committee on Education and the Workforce, House of Representatives. Washington, D.C: The Office, 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Information storage and retrieval systems – Zimbabwe – Students"

1

Kehinde, Adetola. „Digital Libraries and the Role of Digital Librarians“. In Advances in Library and Information Science, 98–119. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3093-0.ch006.

Der volle Inhalt der Quelle
Annotation:
This chapter presents a holistic view of digital libraries and the role of digital librarians. Technological changes and the use of electronic storage and retrieval information systems have changed the way students and researchers are able to access, retrieve and use information. Key topics presented in the chapter include the concept of digitization, reasons for digitization, definitions of digital library, features of digital library, characteristics of digital libraries, advantages and disadvantages of digital library, collection development and content creation, digital librarianship, role of librarians in digital libraries, issues of concern to digital librarians, process of digitization of library resources, digital library components, and digital rights management.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kehinde, Adetola. „Digital Libraries and the Role of Digital Librarians“. In Research Anthology on Collaboration, Digital Services, and Resource Management for the Sustainability of Libraries, 17–38. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8051-6.ch002.

Der volle Inhalt der Quelle
Annotation:
This chapter presents a holistic view of digital libraries and the role of digital librarians. Technological changes and the use of electronic storage and retrieval information systems have changed the way students and researchers are able to access, retrieve and use information. Key topics presented in the chapter include the concept of digitization, reasons for digitization, definitions of digital library, features of digital library, characteristics of digital libraries, advantages and disadvantages of digital library, collection development and content creation, digital librarianship, role of librarians in digital libraries, issues of concern to digital librarians, process of digitization of library resources, digital library components, and digital rights management.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie