Search results

Jump to navigation Jump to search

Page title matches

  • ...rmation is something that imparts knowledge, that will increase knowledge. Information is difficult to precisely define. There are a number of different definitio ...tp://www.businessdictionary.com/definition/information.html|title="What is information"|publisher=businessdictionary.com}} </ref> defines it as:
    6 KB (955 words) - 04:20, 8 September 2020
  • The article begins by talking about information theory, which is a rather specific area of computer science. If this is to ...ibrary and Information Science, after all. They are ''the'' experts about information, taken as a general topic. --[[User:Larry Sanger|Larry Sanger]] 17:07, 22 M
    3 KB (454 words) - 16:31, 17 May 2011
  • Looking at this article, I'm wondering if "information security" is an even better title, perhaps reserving "communications securi : I prefer "information security" as a title for a top-level article. "communications security" exc
    4 KB (594 words) - 20:03, 24 October 2008
  • ...opriate administrative infrastructure for personnel and physical security. Information assurance is meaningless without a security policy defining threats, manage Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules,
    2 KB (232 words) - 16:21, 30 March 2024
  • 29 bytes (3 words) - 01:16, 9 September 2013
  • ...liography in 1895.<ref name=Rayward>Rayward, W.B. (1975) ''The universe of information: the work of Paul Otlet for documentation and international organisation''. ...ganizations and made the economic issues more apparent, to the extent that information management is now seen as having a necessary role in the management of orga
    52 KB (7,729 words) - 23:12, 20 October 2013
  • '''Information overload''' is assumed to have increased significantly in organizations as ...e knowledge available to intelligence and military personnel can cause key information to be missed, as with the [[9/11]] attack.
    14 KB (2,131 words) - 08:39, 22 April 2024
  • File:Information icon.svg.png
    (62 × 62 (4 KB)) - 19:53, 11 March 2022
  • ...lease. The general assumption is that the inappropriate disclosure of such information could do varying levels of harm to the national security of a nation, inclu ...internally as is classified material; governments may receive proprietary information and will be expected, within legal requirements, to protect it from disclos
    12 KB (1,757 words) - 07:30, 18 March 2024
  • ...tten so far, am I correct in that you are focusing on relatively long-term information results in classical expertise, or are things that are more tactical or rea ...ontent/341/bmj.c6815.full this article], "Alvin Toffler coined the phrase “information overload” in 1970" in "Toffler A. Future shock. Bodley Head, 1970", which
    2 KB (328 words) - 19:31, 1 February 2011
  • ...=de Bliek R, Friedman CP, Wildemuth BM, Martz JM, Twarog RG, File D |title=Information retrieved from a database and the augmentation of personal knowledge |journ | title = Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips
    42 KB (5,875 words) - 11:11, 29 March 2012
  • 12 bytes (1 word) - 16:29, 22 August 2008
  • ...attempt to understand and define the basis for understanding the nature of information and its place in the universe, two different key approaches were taken; the ...ematical foundation consisted of a number that could be calculated for the information content of a sequence of symbols in a language given the frequencies of the
    2 KB (363 words) - 14:37, 10 May 2008
  • 12 bytes (1 word) - 11:41, 22 May 2008
  • <!-- Text is transcluded from the Information assymetry/Definition subpage-->
    90 bytes (11 words) - 16:24, 26 March 2012
  • 12 bytes (1 word) - 05:13, 18 December 2007
  • #Redirect [[Classified information]]
    36 bytes (3 words) - 11:53, 22 May 2008
  • <!-- Text is transcluded from the Asymmetric information/Definition subpage-->
    91 bytes (11 words) - 06:32, 2 February 2010
  • 390 bytes (55 words) - 04:57, 28 March 2012
  • #Redirect [[Information theory]]
    32 bytes (3 words) - 14:41, 10 May 2008
  • In United States and NATO doctrine, '''information operations (IO)''' are "The integrated employment of the core capabilities ==Primary Activities in Information Operations==
    10 KB (1,449 words) - 07:30, 18 March 2024
  • #REDIRECT [[Information management]]
    36 bytes (3 words) - 10:30, 2 February 2012
  • 154 bytes (20 words) - 00:17, 2 October 2009
  • <!-- Text is transcluded from the Information asymmetry/Definition subpage-->
    90 bytes (11 words) - 07:30, 27 March 2012
  • <!-- Text is transcluded from the Information cascade/Definition subpage-->
    88 bytes (11 words) - 05:27, 17 March 2010
  • 12 bytes (1 word) - 20:56, 23 December 2007
  • 12 bytes (1 word) - 12:06, 17 May 2008
  • #REDIRECT [[Talk:Information management]]
    41 bytes (4 words) - 10:30, 2 February 2012
  • | pagename = Information | abc = Information
    847 bytes (82 words) - 08:39, 15 March 2024
  • ...access to a computer, all resources on that computer became available. As information threats grew, user rights were restricted on individual computers; a casual ...hether an individual or a government, is likely to try to access one's own information and communications, and how much effort and expense the miscreant will use.
    13 KB (2,000 words) - 16:21, 30 March 2024
  • But should be moved to [[information management]] (lowercase). See [[CZ:Naming Conventions]]. --[[User:Larry Sa
    356 bytes (45 words) - 11:15, 2 February 2012
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • 81 bytes (10 words) - 17:12, 12 April 2010
  • 12 bytes (1 word) - 18:56, 3 November 2007
  • 54 bytes (4 words) - 11:57, 2 August 2013
  • ...ility of transmission of messages with specified accuracy when the bits of information constituting the messages are subject, with certain probabilities, to trans
    273 bytes (34 words) - 08:55, 4 September 2009
  • ...r bureaucratic reasons, its foreign offices were designated as the '''U.S. Information Service (USIS)'''; these often included public libraries.
    1 KB (217 words) - 23:06, 21 January 2010
  • ...ciples to the acquisition, organization, control, dissemination and use of information relevant to the effective operation of organizations of all kinds.
    224 bytes (28 words) - 10:31, 2 February 2012
  • ..., [[integrity]] and [[availability]] to information; usually assumed to be information in a computer or [[telecommunications network]] but the principles extend t
    319 bytes (41 words) - 08:45, 13 September 2009
  • #REDIRECT [[Information management/Definition]]
    47 bytes (4 words) - 10:31, 2 February 2012
  • 81 bytes (10 words) - 17:30, 26 April 2010
  • a situation in which a seller has information that is not available to potential buyers - or vice-versa.
    140 bytes (21 words) - 08:34, 30 October 2009
  • 12 bytes (1 word) - 01:08, 10 May 2008
  • | pagename = Information assurance | abc = Information assurance
    2 KB (233 words) - 10:29, 27 February 2010
  • ...y intelligence analysis management|analyzing (ideally) multiple sources of information on a given subject. Once the analytical results are available, they must be ...iscipline of counterintelligence focuses on protecting one's own sensitive information, not just one's intelligence processes, from an opponent.
    10 KB (1,349 words) - 17:08, 1 April 2024
  • Technique and process of searching, retrieving, and interpreting information from large amounts of stored data.
    148 bytes (18 words) - 19:27, 7 September 2009
  • ...ntly, subject to multiple mechanisms, in the processing of [[data]] into [[information]]. ...uantity of information stored in his or her brain, can be thought of as an information system.
    744 bytes (112 words) - 15:02, 10 November 2007
  • ...searches), analyze the spatial information, and edit data. '''[[Geographic Information Science]]''' is the science underlying the applications and systems, taught Geographic information systems technology can be used for [[science|scientific investigation]]s, [
    41 KB (6,343 words) - 17:02, 22 March 2024
  • #REDIRECT [[Information management/Bibliography]]
    49 bytes (4 words) - 10:32, 2 February 2012
  • ...cs associated with those routes) to particular network destinations. This information contains the topology of the network immediately around it. The construct ...ore this implementation detail, and refer to the entire routing/forwarding information subsystem as the "routing table".
    6 KB (958 words) - 16:23, 30 March 2024

Page text matches

  • == Demographic Information == == Specialty Information ==
    286 bytes (29 words) - 04:08, 22 November 2023
  • ...[[identification (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privile
    299 bytes (36 words) - 11:15, 6 May 2010
  • ...panda/37640.htm Giant Panda] - China Internet Information Center - images, information and links from China, in English *[http://www.pandaclub.net Panda Club] - information from the [[Wolong National Nature Reserve]] in [[Sichuan]]
    287 bytes (42 words) - 03:00, 30 October 2007
  • ...g/ Information Resources Management Association] - the USA association for information managers. * [http://www.aslib.co.uk/ Aslib] - the UK association for information management.
    2 KB (222 words) - 10:31, 2 February 2012
  • In ''[[information science]]'', the organizational structure of information.
    76 bytes (10 words) - 09:23, 17 April 2011
  • ...(information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • ...ry, government documents, especially [[classified information|declassified information]]
    197 bytes (20 words) - 18:40, 18 November 2009
  • ...tion in a [[compartmented control system]] such as Sensitive Compartmented Information (SCI) or Special Access Program (SAP)
    306 bytes (38 words) - 11:45, 16 July 2008
  • ...ntly, subject to multiple mechanisms, in the processing of [[data]] into [[information]]. ...uantity of information stored in his or her brain, can be thought of as an information system.
    744 bytes (112 words) - 15:02, 10 November 2007
  • ==Finding information==
    204 bytes (29 words) - 13:12, 24 November 2009
  • == Personal information ==
    209 bytes (27 words) - 04:52, 22 November 2023
  • ...site]. Can anyone figure out what the license should be based on this new information? The attribution needs to be changed too. [[User:Chris Day|Chris Day]] 10:
    355 bytes (58 words) - 10:50, 16 September 2008
  • * [http://www.worldcoal.org/coal_info.asp Coal Information] From website of the World Coal Institute. ...ww.uky.edu/KGS/coal/coal_mining.htm Methods of Mining] Excellent source of information on coal mining methods.
    851 bytes (113 words) - 10:55, 22 October 2010
  • ...magnetic signal transmission, the basic information-free signal onto which information is modulated.
    146 bytes (16 words) - 17:05, 26 May 2008
  • ====Places with more information====
    542 bytes (70 words) - 13:37, 28 May 2009
  • In [[information security]], the assurance that data retrieved from an information system has the same meaning as when it was entered
    169 bytes (24 words) - 15:24, 30 September 2009
  • .../wiki/Template:UKHouseofCommonsStateoftheParties-tablerows to change party information.-->
    448 bytes (47 words) - 07:49, 26 March 2017
  • .../wiki/Template:UKHouseofCommonsStateoftheParties-tablerows to change party information.-->
    457 bytes (46 words) - 08:25, 1 April 2022
  • ...or subsequent analysis, and assigning probabilities of accuracy to the raw information
    312 bytes (39 words) - 10:14, 26 July 2008
  • == Online information about school history == This information came out in early 2022 and could be incorporated into this article: https:/
    434 bytes (51 words) - 06:31, 5 June 2022
  • ...ibe the format of managed information, that being the role of [[Management Information Base]] specifications
    341 bytes (48 words) - 10:29, 25 September 2008
  • ...[http://www.itl.nist.gov/iaui/894.02/related_projects/muc/ Introduction to Information Extraction]
    269 bytes (32 words) - 08:12, 14 September 2013
  • {{r|Information theory}} {{r|Noise (information theory)}}
    718 bytes (88 words) - 14:17, 28 March 2010
  • ...ain strategic understanding, to detect anomalies, or to actively probe for information
    196 bytes (24 words) - 12:30, 22 June 2009
  • ...y]] over [[electromagnetic radiation]] in free space (i.e., wireless). The information is [[modulation|modulated]] onto a [[carrier wave]]
    261 bytes (33 words) - 12:24, 25 May 2008
  • ...ogrammers and end users to enter information into computers and to look up information which is already in them.
    174 bytes (26 words) - 08:51, 19 November 2011
  • '''[[/Template1|User general information template]]''' '''[[/Template2|User workgroup information template]]'''
    192 bytes (24 words) - 21:46, 19 January 2008
  • ...r]], illustrating both sides of the debate whether [[science]] experiences information overload in the era of the [[World Wide Web]] *[http://web2expo.blip.tv/file/1277460 It's Not Information Overload. It's Filter Failure.] &mdash; presentation by [[Clay Shirky]] at
    782 bytes (105 words) - 19:33, 9 December 2010
  • ...on and dissemination of literature or information - the activity of making information available for public view.
    172 bytes (23 words) - 18:48, 11 August 2009
  • ...ly for transient information but sometimes for permanent or semi-permanent information such as "boot" data for initialization
    226 bytes (28 words) - 16:18, 18 March 2009
  • ==General information== ===Production information===
    1 KB (161 words) - 03:37, 4 April 2017
  • {{r|Information theory}} ===Information theory===
    761 bytes (97 words) - 18:05, 3 March 2010
  • ==Further information==
    432 bytes (63 words) - 15:24, 15 December 2013
  • ...pected of war crimes were not prosecuted in exchange for information, such information on the [[Soviet Union]]
    235 bytes (33 words) - 14:18, 14 September 2009
  • ...g aware of all relevant information in one's environment, prioritizing the information, and not being distracted by irrelevancies
    181 bytes (24 words) - 04:31, 2 February 2011
  • Professor of Information Studies UCLA Department of Information Studies
    357 bytes (43 words) - 04:07, 22 November 2023
  • ...ica.org/public/breeds/oc/intro.php The International Cat Association breed information.] *[http://www.iams.com/pet-health/cat-breeds/ocicat IAMS Ocicat breed information]
    395 bytes (55 words) - 23:48, 7 December 2011
  • ...pueblo.gsa.gov] (the [[Federal citizen information center|Federal Citizen Information Center]])
    531 bytes (73 words) - 00:37, 14 September 2013
  • ==Official government information about amateur radio licensing and operating== ...rvices/index.htm?job=service_home&id=amateur FCC] Official U.S. government information about amateur radio, from the Federal Communications Commission, the offici
    1 KB (158 words) - 12:49, 11 October 2009
  • ...gy/BVHomePage.html The Big Picture Book of Viruses] - Pictures and general information on many viruses * [http://www.vbrc.org Detailed genomic and bioinformatic information about Category A, B, and C priority pathogens at NIH-funded database].
    823 bytes (115 words) - 02:48, 27 May 2008
  • ===For additional information===
    671 bytes (93 words) - 19:34, 27 June 2008
  • ...l Library of Information Science and Technology, an open access archive of Information Sciences materials ...vest.sir.arizona.edu DL-Harvest] DL-Harvest, an open access aggregator for Information Sciences
    1 KB (210 words) - 07:20, 12 February 2009
  • ...ated by computers or not. It complements computer security, which protects information in computers. Many of the same criteria of information assurance apply, but not all, and there are some aspects unique to COMSEC.
    650 bytes (95 words) - 16:22, 30 March 2024
  • ...isclosure, including means for protecting personal privacy and proprietary information." <ref>44 USC 3542</ref> ...ure of contents. In a military context, however, the very existence of the information, and of its transmission, must remain secret against the threats of [[traff
    725 bytes (96 words) - 13:27, 30 September 2009
  • ...ty. His interests include Information Research, Information Management and Information Literacy. As the chairman of the Board of Examiners of the faculty of ICT & [[Category:CZ Authors]][[Category:Library and Information Science Authors]]
    685 bytes (96 words) - 04:08, 22 November 2023
  • {{r|Information security}} {{r|RADIUS (information security)}}
    558 bytes (60 words) - 10:08, 4 May 2022
  • ...ed States public information source, conducting what today is called the [[information operations#psychological operations|"white propaganda" aspect of psychologi
    273 bytes (33 words) - 16:21, 9 September 2008
  • ...ently seeking information on the birth and death of Suchman and additional information. [[User:Roger A. Lohmann|Roger A. Lohmann]] 14:31, 25 April 2013 (UTC)
    180 bytes (25 words) - 09:31, 25 April 2013
  • I finished the medium tourist school, so I know many tourist information about my town Sezana , my region Primorska and about my country Slovenia. ...world can read information about the place, where I live.. I also add some information in Wikipedia.
    593 bytes (98 words) - 04:40, 22 November 2023
  • ...Systems Auditor. I am interested in studies related to India, Outsourcing, Information Technology Auditing and ITIL related methodologies etc;
    362 bytes (56 words) - 04:26, 22 November 2023
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)