NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Bills, Linda G.; Helgerson, Linda W. – Library Hi Tech, 1988
Reports information gathered from eight vendors on the preparation of bibliographic data for CD-ROM public access catalogs: (1) sources of bibliographic records; (2) duplicate record handling; (3) holdings and location information; (4) maintaining the database; (5) authority control; (7) record corrections; (7) extraction of subsets; (8)…
Descriptors: Bibliographic Databases, Bibliographic Records, Comparative Analysis, Database Design
Peer reviewed Peer reviewed
Rubin, Michael Rogers – Library Hi Tech, 1988
The second of three articles on abusive data collection and usage practices and their effect on personal privacy, discusses the evolution of data protection laws worldwide, and compares the scope, major provisions, and enforcement components of the laws. A chronology of key events in the regulation of computer databanks in included. (1 reference)…
Descriptors: Data Collection, Databases, Foreign Countries, Global Approach
Peer reviewed Peer reviewed
Hoffmann, Ellen – Library Hi Tech, 1988
Discussion of issues in management of library automation includes: (1) hardware, including systems growth and contracts; (2) software changes, vendor relations, local systems, and microcomputer software; (3) item and authority databases; (4) automation and library staff, organizational structure, and managing change; and (5) environmental issues,…
Descriptors: Computer Software, Databases, Financial Support, Library Administration
Peer reviewed Peer reviewed
McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Peer reviewed Peer reviewed
Webb, T. D.; Zhang, Bin – Library Hi Tech, 1997
The appearance of revolutionary information technologies must elicit equivalent responses from the library profession. Creating local online databases--information dropshipping--is an activity that public and academic libraries can implement. Through technology, libraries can create a new domain on the production side of knowledge and information.…
Descriptors: Academic Libraries, Change, Database Design, Information Industry
Peer reviewed Peer reviewed
Matthews, Joseph R. – Library Hi Tech, 1997
Libraries are moving into an era that incorporates improvements of a library's existing databases, embraces the research results of the information-seeking process, and makes fundamental improvements by adding new databases such as WordFocus. These new systems should convert the frustrated user of today's online public access catalog (OPAC) into…
Descriptors: Access to Information, Databases, Information Seeking, Library Automation
Peer reviewed Peer reviewed
Dowlin, Kenneth E.; And Others – Library Hi Tech, 1986
Describes the Maggie III automated library system, which supports a public access catalog, cataloging interface, bibliographic maintenance, circulation, electronic mail, and community information databases, with acquisitions and serials modules planned. Sidebars describe the community information database's structure, planned use of software by…
Descriptors: Access to Information, Community Information Services, Computer Software, Databases
Peer reviewed Peer reviewed
Mellinger, Michael J. – Library Hi Tech, 1987
This detailed description of a fully integrated, turnkey library system includes a complete profile of the system (functions, operational characteristics, hardware, operating system, minimum memory and pricing); history of the technologies involved; and descriptions of customer services and availability. (CLB)
Descriptors: Computer Software Reviews, Databases, Indexes, Information Systems
Peer reviewed Peer reviewed
Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)
Peer reviewed Peer reviewed
Senzig, Donna M.; Bright, Franklyn F. – Library Hi Tech, 1987
Describes the Network Library System, a collaborative development project undertaken by the University of Wisconsin-Madison and University of Chicago libraries, which currently handles an online catalog and a circulation system. The conceptualization of the system, its development and performance, and subsequent changes due to available…
Descriptors: Academic Libraries, Bibliographic Utilities, Computer Networks, Cooperative Programs