NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Coogan, John F. – Journal of Electronic Resources Librarianship, 2019
Resolving user access issues is inherent in managing electronic resources in libraries. The University of Maryland University College (UMUC) Library, situated within a predominantly distance learning-centered institution, has developed a series of web-based technical help pages to facilitate resolution of typical issues reported by its…
Descriptors: Access to Information, Users (Information), Information Management, Technical Support
Peer reviewed Peer reviewed
Tebbetts, Diane R. – Journal of Library Administration, 1999
Provides a framework for examining the complex infrastructure needed to successfully implement a digital library. Highlights include database development, online public-access catalogs, interactive technical services, full-text documents, hardware and wiring, licensing, access, and security issues. (Author/LRW)
Descriptors: Access to Information, Computer Security, Electronic Libraries, Full Text Databases
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
Anderson, Laura Challman; Lotspiech, Jeffrey B. – Bulletin of the American Society for Information Science, 1995
Discusses collaborative efforts by the Institute for Scientific Information (ISI) and the IBM Digital Library Group in creating techniques to ensure information integrity, journal article authenticity, user confidentiality, management of copyright, and general security in electronic libraries. Also describes the rights management and security…
Descriptors: Access to Information, Computer Security, Computer System Design, Confidentiality
Peer reviewed Peer reviewed
Trolley, Jacqueline H.; Cody, Julianne W. – Science & Technology Libraries, 1997
The Institute for Scientific Information Electronic Library Project (ELP) is a result of user demand for electronic access to scientific journal literature as well as to those journals themselves. This article describes the ELP; examines ELP's partnerships with technological organizations, publishers, librarians, and users; and discusses two core…
Descriptors: Access to Information, Computer Security, Cooperative Programs, Economic Factors
Ely, Donald P. – 1997
The definition, role, and functions of "library" are changing. The National Library of Education (NLE) is in transition from a traditional library to a virtual library encompassing "one stop [any stop] shopping" through conventional and digital means. To adequately plan for the transition, the customer and potential customers…
Descriptors: Access to Computers, Access to Information, Computer Security, Copyrights