Descriptor
Databases | 3 |
Access to Information | 2 |
Computer Software | 2 |
Vendors | 2 |
Accessibility (for Disabled) | 1 |
Blindness | 1 |
Comparative Analysis | 1 |
Computer Networks | 1 |
Computer Security | 1 |
Database Producers | 1 |
Federal Legislation | 1 |
More ▼ |
Source
Library Hi Tech | 3 |
Author
Byerley, Suzanne L. | 1 |
Chambers, Mary Beth | 1 |
Garrison, William V. | 1 |
Helgerson, Linda W. | 1 |
McClellan, Gregory A. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Rehabilitation Act 1973 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating

Helgerson, Linda W. – Library Hi Tech, 1986
Discusses search and retrieval software for use with CD-ROM. Background trends, how data are made usable, supply and demand, data preparation services, and capabilities of search software are described. Vendors of significant information retrieval products are identified, and the characteristics of 12 packages are compared. (Author/EM)
Descriptors: Comparative Analysis, Computer Software, Database Producers, Databases

Byerley, Suzanne L.; Chambers, Mary Beth – Library Hi Tech, 2002
Examined the accessibility of two Web-based abstracting and indexing services by blind users using screen-reading programs based on guidelines from the Rehabilitation Act of 1973 and Web Content Accessibility Guidelines by the WWW Consortium. Suggests Web developers need to conduct usability testing and librarians need to be aware of accessibility…
Descriptors: Access to Information, Accessibility (for Disabled), Blindness, Computer Software

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases