Seven information practices for alleviating information vulnerability.
Devendra Dilip PotnisJoseph WinberryPublished in: J. Documentation (2022)
Keyphrases
- data sets
- information retrieval
- information sources
- information extraction
- real time
- information fusion
- contextual information
- information processing
- artificial intelligence
- prior knowledge
- information flow
- higher level
- information technology
- digital libraries
- social networks
- genetic algorithm
- machine learning
- neural network
- databases