Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Access to Information | 6 |
Computer Software Evaluation | 6 |
Information Networks | 6 |
Online Catalogs | 3 |
Comparative Analysis | 2 |
Computer Networks | 2 |
Computer Security | 2 |
Computer System Design | 2 |
Information Systems | 2 |
Library Catalogs | 2 |
Local Area Networks | 2 |
More ▼ |
Source
CD-ROM Professional | 1 |
Journal of Digital Learning… | 1 |
Journal of Education for… | 1 |
Public-Access Computer… | 1 |
Author
Atkinson, Roderick D. | 1 |
Greenfield, Rich | 1 |
Hooper, Todd | 1 |
Snyder, Robin M. | 1 |
Stanton, Deidre E. | 1 |
Trust, Torrey | 1 |
Yokley, John R. | 1 |
Zhao, Jensen | 1 |
Zhao, Sherry Y. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Book/Product Reviews | 2 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 2 |
Guides - Classroom - Learner | 1 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Trust, Torrey – Journal of Digital Learning in Teacher Education, 2012
In the information age, students must learn to navigate and evaluate an expanding network of information. Highly effective teachers model this process of information analysis and knowledge acquisition by continually learning through collaboration, professional development, and studying pedagogical techniques and best practices. Many teachers have…
Descriptors: Web Sites, Web 2.0 Technologies, Computer Software Evaluation, Teacher Collaboration
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation

Stanton, Deidre E.; Hooper, Todd – Public-Access Computer Systems Review, 1992
Describes and evaluates LIBS Internet Access Software (also called Sonoma Software), which offers automatic Telnet connection to remote library catalogs, databases, information services, campuswide information services, and other wide-area information access tools. Instructions for obtaining and installing the software are given, and a comparison…
Descriptors: Access to Information, Computer Software Evaluation, Computer System Design, Gateway Systems
Greenfield, Rich – 1997
The author argues that traditional library cataloging (MARC) and the online public access catalog (OPAC) are in collision with the world of the Internet because items in electronic formats undergo MARC cataloging only on a very selective basis. Also the library profession initially isolated itself from World Wide Web development by predicting no…
Descriptors: Access to Information, Authority Control (Information), Automatic Indexing, Bibliographic Records

Atkinson, Roderick D.; Yokley, John R. – CD-ROM Professional, 1993
Describes the development of the Naval Research Laboratory (NRL) library information network which provides NRL scientists with access to CD-ROM databases, electronic journals, software applications, the Internet, and the library's online catalog. Implementation phases, system research and development, CD-ROM networking feasibility analysis,…
Descriptors: Access to Information, Computer Software Evaluation, Databases, Evaluation Criteria