NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewed Peer reviewed
Grosch, Audrey N. – Electronic Library, 1988
Discusses rationale for operating an electronic bulletin board in an academic library setting and considerations for software and hardware selection. Experiences related to the operation of a bulletin board system at the University of Minnesota Library are summarized in the areas of goals and rationale, system selection, system configuration, and…
Descriptors: Academic Libraries, Computer Software, Electronic Mail, Higher Education
Peer reviewed Peer reviewed
Konomos, Philip; Herrington, Scott – Electronic Library, 2000
Discusses concerns at the Arizona State University library regarding inappropriate uses of their public workstations, including Web surfing, personal email, and accessing pornography. Describe data collection techniques, including observation and electronic data collection software, which investigated use and availability data for workstations.…
Descriptors: Academic Libraries, Access to Computers, Computer Software, Computer Uses in Education
Peer reviewed Peer reviewed
Tao, Dorothy S. – Electronic Library, 1987
Discusses the rationale, methodology, capabilities and problems of a local area network created for the Library Consortium of Health Institutions in Buffalo, using a multi-user microcomputer. The rationale and design of a new network, designed to better meet information and compatibility requirements, are described and suggestions to network…
Descriptors: Academic Libraries, Access to Information, Computer Software, Consortia