NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Coogan, John F. – Journal of Electronic Resources Librarianship, 2019
Resolving user access issues is inherent in managing electronic resources in libraries. The University of Maryland University College (UMUC) Library, situated within a predominantly distance learning-centered institution, has developed a series of web-based technical help pages to facilitate resolution of typical issues reported by its…
Descriptors: Access to Information, Users (Information), Information Management, Technical Support
Peer reviewed Peer reviewed
Direct linkDirect link
Hudomalj, Emil; Jauk, Avgust – Program: Electronic Library and Information Systems, 2006
Purpose: To give an overview of the current state and trends in authentication and authorisation in satisfying academic library users' mobility and instant access to digital information resources, and to propose that libraries strongly support efforts to establish a global authentication and authorisation infrastructure.…
Descriptors: Academic Libraries, Library Services, Access to Information, Computer Security
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security