Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 8 |
Descriptor
Access to Information | 21 |
Computer System Design | 21 |
Library Automation | 15 |
Higher Education | 8 |
Library Services | 7 |
Automation | 6 |
College Libraries | 5 |
Electronic Libraries | 5 |
Information Retrieval | 5 |
Online Searching | 5 |
Academic Libraries | 4 |
More ▼ |
Source
Author
Moens, Marie-Francine | 2 |
Uyttendaele, Caroline | 2 |
Alawneh, John | 1 |
Anderson, Eric | 1 |
Bacon, Jean | 1 |
Baker, Stewart C. | 1 |
Bell, Colleen | 1 |
Benson, Allen C. | 1 |
Berliss, Jane | 1 |
Bicil, Yucel | 1 |
Celebi, Sait | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 6 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Media Staff | 2 |
Practitioners | 1 |
Location
Belgium | 2 |
Indiana | 1 |
Turkey | 1 |
United States | 1 |
Wisconsin | 1 |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Baker, Stewart C. – Journal of Library & Information Services In Distance Learning, 2014
This article argues that accessibility and universality are essential to good Web design. A brief review of library science literature sets the issue of Web accessibility in context. The bulk of the article explains the design philosophies of progressive enhancement and responsive Web design, and summarizes recent updates to WCAG 2.0, HTML5, CSS…
Descriptors: Web Sites, Computer System Design, Computer Software, Computer Software Reviews
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Hassler, Carol – Computers in Libraries, 2012
When staff at the Wisconsin State Law Library began compiling a wish list for a new website, the topic of a new domain name came up almost immediately. Their old website was located at http://wsll.state.wi.us. Spelling that relatively complex domain over the phone day after day provided the impetus to explore other options. Whatever domain name…
Descriptors: Search Engines, Computer System Design, Design Preferences, Guidelines
Yurtay, Nilufer; Bicil, Yucel; Celebi, Sait; Cit, Guluzar; Dural, Deniz – Turkish Online Journal of Educational Technology - TOJET, 2011
Speech synthesis is a technology used in many different areas in computer science. This technology can bring a solution to reading activity of visually impaired people due to its text to speech conversion. Based on this problem, in this study, a system is designed needed for a visually impaired person to make use of all the library facilities in…
Descriptors: Library Facilities, Library Automation, Access to Information, Accessibility (for Disabled)
Miller, L. D.; Soh, Leen-Kiat; Samal, Ashok; Nugent, Gwen – International Journal of Artificial Intelligence in Education, 2012
Learning objects (LOs) are digital or non-digital entities used for learning, education or training commonly stored in repositories searchable by their associated metadata. Unfortunately, based on the current standards, such metadata is often missing or incorrectly entered making search difficult or impossible. In this paper, we investigate…
Descriptors: Computer Science Education, Metadata, Internet, Artificial Intelligence
Huang, Kuo Hung, Ed. – InTech, 2011
Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…
Descriptors: Computer Networks, Publishing Industry, Electronic Libraries, Educational Resources
Woods, Kam A. – ProQuest LLC, 2010
Over the past several decades, millions of digital objects of significant scientific, economic, cultural, and historic value have been published and distributed to libraries and archives on removable media. Providing long-term access to these documents, media files, and software executables is an increasingly complex task because of dependencies…
Descriptors: Computer Software, Research Libraries, Electronic Libraries, Archives

Moens, Marie-Francine; Uyttendaele, Caroline; Dumortier, Jos – Journal of the American Society for Information Science, 1999
The SALOMON project automatically summarizes Belgian criminal cases to improve access to existing and future court decisions. This article gives background information about the texts of the cases and describes the output, design models, and architecture of the SALOMON system. Evaluation of 700 criminal cases demonstrates that the algorithms have…
Descriptors: Abstracting, Access to Information, Automatic Indexing, Automation
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Phillips, Lori – 1997
This study, conducted at the University of Wyoming (UW), illustrates the complexity involved in making reasonable decisions about which electronic products to make available in the library. UW is a member of the CARL Alliance, and utilizes the CARL integrated online system which includes an OPAC, circulation, serials control, bibliographic…
Descriptors: Academic Libraries, Access to Information, Computer System Design, Databases
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development

Moens, Marie-Francine; Uyttendaele, Caroline – Information Processing & Management, 1997
Describes SALOMON (Summary and Analysis of Legal texts for Managing Online Needs), a system which automatically summarizes Belgian criminal cases to improve access to court decisions. Highlights include a text grammar represented as a semantic network; automatic abstracting; knowledge acquisition and representation; parsing; evaluation, including…
Descriptors: Abstracting, Access to Information, Automation, Computer System Design
Bell, Colleen – Public Services Quarterly, 2006
What would it take for libraries to provide their patrons with the same kind of success in finding information using their resources as they achieve with Google, and as quickly? This author asserts that the answer is not that complicated: be more like Google, and then move beyond Google. With the technology available right now, this is not an…
Descriptors: Web Sites, Academic Libraries, Internet, Library Services
Anderson, Eric – Wilson Library Bulletin, 1993
Argues for simplification in the use and development of bibliographic standards to increase usability by librarians and patrons and to reduce costs for libraries. The application of technology such as hypertext is also considered. (EA)
Descriptors: Access to Information, Cataloging, Computer System Design, Costs
Holland, David G. – 1998
This paper outlines a process implemented at Mott Community College (Michigan) for building technology-based systems that would encourage collaboration among the staff. The first goal was communication, which included using the following technology to allow people to communicate and to make information available: e-mail, calendaring,…
Descriptors: Access to Information, Automation, Community Colleges, Computer Mediated Communication
Previous Page | Next Page ยป
Pages: 1 | 2