Academic literature on the topic 'Information storage and retrieval systems – Zimbabwe – Students'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information storage and retrieval systems – Zimbabwe – Students.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information storage and retrieval systems – Zimbabwe – Students"
Eller, Ben F., Alan S. Kaufman, and James E. McLean. "Computer-Based Assessment of Cognitive Abilities: Current Status/Future Directions." Journal of Educational Technology Systems 15, no. 2 (December 1986): 137–47. http://dx.doi.org/10.2190/545h-mvcj-vdap-ftx9.
Full textTsai, Chih-Fong, Shih-Wen Ke, Kenneth McGarry, and Ming-Yi Lin. "LocalContent: a personal scientific document retrieval system." Electronic Library 33, no. 3 (June 1, 2015): 373–85. http://dx.doi.org/10.1108/el-08-2013-0148.
Full textHandayani, Putu Wuri, Stéphane Bressan, Doan Khanh Han, and Omar Boucelma. "IMPLEMENTASI SISTEM PENGELOLAAN PROSES BISNIS MENGACU PADA MIT PROCESS HANDBOOK." Jurnal Sistem Informasi 5, no. 2 (July 13, 2012): 106. http://dx.doi.org/10.21609/jsi.v5i2.270.
Full textDissertations / Theses on the topic "Information storage and retrieval systems – Zimbabwe – Students"
Kagoro, Kisemiire Christine. "Evaluation of the development and use of the institutional repository by staff and students at the University of Fort Hare in Eastern Cape, South Africa." Thesis, University of Fort Hare, 2018. http://hdl.handle.net/10353/6292.
Full textHe, Xue Wei. "Exploring health and fitness apps adoption intention among college students." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3952604.
Full textMalaney, Gary Douglas. "The coordination of information in a highly differentiated organization : use of a computerized relational data base system as an integrating device for monitoring graduate education /." The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487261919113367.
Full textAlemu, Getahun. "White Board." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2195.
Full textMaguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.
Full textSchool of Computing
Ph. D. (Information Systems)
Zhou, Samson Zigah. "Understanding the inter-relationships for the creation of a local land information system : the Zimbabwean local government experience at growth points." Thesis, 2000. http://hdl.handle.net/10413/5400.
Full textThesis (M.Sc.Sur.)-University of Natal, Durban, 2000.
Newbold, Margaret C. "A comparison of sixth-grade students' access, retrieval, and utilization of information obtained from CD-ROM and print sources." 1993. http://books.google.com/books?id=PsecAAAAMAAJ.
Full textIncludes abstract. "March, 1993." eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 181-187).
Musonza, Dimax. "The implementation of integrated security systems: case study of the industrial sector of Harare-Zimbabwe." Diss., 2016. http://hdl.handle.net/10500/21012.
Full textIndustrial sites in Harare contribute significantly to the economy of Zimbabwe. Harare is the capital city of Zimbabwe and therefore has significant manufacturing and commercial activity. The protection of industrial sites is very important because of the presence of valuable assets and operations. Therefore the main purpose of deploying security measures at industry premises is to create a safe and secure environment for the business functions. Security management is consequently an important element of an industrial organisation’s continuity. The implementation of integrated security systems was examined to some extent within this study. The size and nature of industrial facilities influenced this study to view integrated security systems as more effective than stand-alone security measures. The study sought to investigate the various aspects associated with the implementation. The purposes of the research included the following: • Examine current practices, benefits, shortcomings in the implementation of integrated security systems; • Critically evaluate the security management aspects required for the implementation ofintegrated security systems; • Investigate successes and failures associated with integrated security systems and how implementation can be improved; • Examine and identify factors necessary for a best practice approach to integrated security systems; and • Determine a methodology for the effective implementation of integrated security systems. Additionally the study briefly examined how security systems integration can assist in reducing the problem of connivance to theft at receiving and dispatch points at industrial facilities. The report is divided into five chapters. Chapter 1 covers the research problem, Chapter 2 deals with the research methods while Chapter 3 has insightful information from literature review. Chapter 4 presents the data and how it was analysed. Lastly Chapter 5 has findings, recommendations and conclusions. The study used the mixed-method approach. This approach includes both qualitative and quantitative research in order to gain a more in-depth understanding of the research problem. The methods of data collection were site visits, interviews and questionnaires. The sample was drawn from a cross-section of sites within the industrial areas of Workington, Southerton, Willowvale, Graniteside, Msasa and few outside industries in the vicinity of Harare. A total of 11 sites were observed. The interviews consisted of 30 participants who were mainly security practitioners at management level as well as some non-security managers. In addition, a total of 102 respondents participated in this study by completing the questionnaire. The majority of the respondents were security practitioners who were the main focus of the study. The findings support the various aspects of the implementation of integrated security systems. The conclusions emanating from the statistical analysis of the collected data included the following: • The critical assets for protection at industrial facilities are infrastructure, products, revenue, people and other movable items or equipment; • The main threat sources are from outsiders, crime syndicates and employees; • Security systems suitable for integration are CCTV, electronic access control, alarms, personnel, policies and procedures backed by information communication technologies. • Security should be functionally integrated with other departments which include Information Technology, Human Resources, Finance, Operations and Marketing; • The preferred mode of linkage was established to be fibre optic on a local area or wide area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration. area network using intranet or internet; • The key players in the integration were found to be security practitioners, top management, IT specialist, system suppliers, installers and operators; • The implementation process consists of security policy, survey, system design, procurement, installation, training, operating, review and upgrade; • Factors necessary for best practice include system purpose, availability of resources, top management commitment, skills, and feasibility to implement; • The benefits are mainly improved effectiveness, easy of monitoring, improved outlook and record keeping; • The most significant challenges are system breakdown, sabotage and power outage; and • Connivance to theft can be mitigated by a combination of staff rotation, dedicated CCTV, spot checks, undercover surveillance and functional integration.
Security Risk Management
M. Tech. (Security Management)
Davis, Dorothy Frances. "A comparison of bibliographic instruction methods on CD-ROM databases." 1992. http://books.google.com/books?id=nhzhAAAAMAAJ.
Full textBrown, Lyn Stephen. "Development, implementation, and evaluation of an information literacy program for the undergraduate school at Philadelphia College of Bible." 1996. http://books.google.com/books?id=WxzhAAAAMAAJ.
Full textBooks on the topic "Information storage and retrieval systems – Zimbabwe – Students"
Students' guide to information technology. 2nd ed. Oxford: Newnes, 1993.
Find full textCarter, Roger. Students' guide to information technology. Oxford: Heinemann Newnes, 1989.
Find full textMotomatsu, Nancy R. Research goes to school: Teaching students to go online (under Chapter 2 - ECIA). Olympia, WA: Superintendent of Public Instruction, 1987.
Find full textUniversity of Pittsburgh 1990 American Society of Information Science Student Conference (1990 University of Pittsburgh). Proceedings of the University of Pittsburgh 1990 American Society for Information Science Students Conference. Pittsburgh, PA: School of Library and Information Science, University of Pittsburgh, 1990.
Find full textLexis-Nexis for law students. 3rd ed. Larchmont, NY: Emanuel, 1997.
Find full textLEXIS-NEXIS for law students. Larchmont, NY: Emanuel Law Outlines, 1994.
Find full textLexis-Nexis for law students. 2nd ed. Larchmont, NY: Emanuel, 1995.
Find full textHannes, Britz, ed. Information, ethics and the law: A guide for information practitioners, students and the corporate environment. Pretoria, South Africa: Van Schaik, 2006.
Find full textFranklin, Hugh Lockwood. Comprehensive literature searching in engineering: Textbook for Engr. 485. [Corvallis, Or.]: Oregon State University, 1987.
Find full textOffice, General Accounting. Student financial aid: Federal aid awarded to students taking remedial courses : report to the ranking minority member, Subcommittee on Postsecondary Education, Training, and Life-Long Learning, Committee on Education and the Workforce, House of Representatives. Washington, D.C: The Office, 1997.
Find full textBook chapters on the topic "Information storage and retrieval systems – Zimbabwe – Students"
Kehinde, Adetola. "Digital Libraries and the Role of Digital Librarians." In Advances in Library and Information Science, 98–119. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3093-0.ch006.
Full textKehinde, Adetola. "Digital Libraries and the Role of Digital Librarians." In Research Anthology on Collaboration, Digital Services, and Resource Management for the Sustainability of Libraries, 17–38. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8051-6.ch002.
Full text