Descriptor
Systems Development | 5 |
Library Automation | 3 |
Systems Analysis | 3 |
Automation | 2 |
Cost Effectiveness | 2 |
Administrative Organization | 1 |
Archives | 1 |
Bids | 1 |
Budgeting | 1 |
Check Lists | 1 |
Computer Software | 1 |
More ▼ |
Author
Adkins, Meredith C. | 1 |
Chick, Morey J. | 1 |
Cook, Michael | 1 |
Kington, Robert A. | 1 |
Lucas, Kathleen C. | 1 |
Wanger, Judith | 1 |
Publication Type
Guides - General | 5 |
Journal Articles | 3 |
Opinion Papers | 3 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cook, Michael – 1986
Developed under a contract with the International Council on Archives, these guidelines are designed to emphasize the role of automation techniques in archives and records services, provide an indication of existing computer systems used in different archives services and of specific computer applications at various stages of archives…
Descriptors: Archives, Automation, Developed Nations, Developing Nations

Kington, Robert A. – Library Hi Tech, 1987
Outlines factors used by online vendors to decide whether to bid on RFPs (requests for proposals) for library automation systems, including specifications for software, hardware or performance requirements not met by the vendor; specifications based on competitors' systems; the size and complexity of the request itself; and vendors' time…
Descriptors: Bids, Decision Making, Evaluation Criteria, Library Automation

Adkins, Meredith C.; Lucas, Kathleen C. – Electronic Library, 1986
This checklist provides guidance on how to measure adequacy of control and security of computer systems, identifies areas of risk, raises management and user awareness of their stewardship responsibilities, and reviews issues relative to system documentation, maintenance, integrity, and reliability. (MBR)
Descriptors: Check Lists, Computer Software, Cost Effectiveness, Integrity
Chick, Morey J. – Information Management Review, 1990
Argues that the security of automated information systems must be made a management priority and effectively supported. The steps needed to achieve this objective are outlined in the areas of information resources management planning, budgeting and costing, directing, organizing, training, and controlling. A list of suggested readings is provided.…
Descriptors: Administrative Organization, Automation, Budgeting, Cost Effectiveness
Wanger, Judith; And Others – 1981
Designed to facilitate communications in future automation projects between library and data processing personnel, especially those projects involving the use of automated systems in the service of disabled patrons, this guide identifies and describes a master set of major circulation system requirements and design considerations, and illustrates…
Descriptors: Disabilities, Library Automation, Library Circulation, Library Networks