NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Jaffe, Lee David; Watkins, Steven G. – CD-ROM Professional, 1992
Presents selection and design considerations to help libraries make informed decisions about hardware configurations of CD-ROM systems. Highlights include CD-ROM configurations, including single drive workstations, daisychains, and jukeboxes; network configurations, including remote access; microcomputer features; CD-ROM drive selection; and…
Descriptors: Access to Information, Computer Networks, Computer System Design, Cost Effectiveness
CAUSE/EFFECT, 1999
Discusses some emerging issues for information resources and use in higher education, including challenges in advanced networking; distributed-information technology (IT); authentication, authorization, and access management; distance learning; intellectual property in a networked environment; and campus-business continuity planning. Funding,…
Descriptors: Access to Information, College Administration, College Planning, Computer Networks
Helsing, Cheryl; And Others – 1989
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Descriptors: Access to Information, Computer System Design, Confidentiality, Decision Making
Peer reviewed Peer reviewed
Micco, Mary; Smith, Irma – Library Software Review, 1987
Proposes a framework for the design of a full function workstation for information retrieval based on study of information seeking behavior. A large amount of local storage of the CD-ROM jukebox variety and full networking capability to both local and external databases are identified as requirements of the prototype. (MES)
Descriptors: Access to Information, Computer Networks, Computer System Design, Information Dissemination
Tyckoson, David A., Ed. – 1991
This book addresses the problem of when a library has limited catalog access, and explores various technological methods to expand the catalog beyond its traditional boundaries. Fourteen chapters describe catalog projects in individual libraries: (1) "Enhancing Access to Information: Building Catalogs for the Future" (David A. Tyckoson);…
Descriptors: Academic Libraries, Access to Information, Bibliographic Databases, Bibliographic Records
Miami-Dade Community Coll., FL. – 1992
This book contains 37 papers on computer use in higher education originally presented at a May, 1992, conference of college and university computer users. Most of the papers describe programs or systems implemented at particular institutions and cover the following: systems for career planning, automating purchasing and financial commitments,…
Descriptors: Access to Information, Career Information Systems, Computer Networks, Computer Oriented Programs